heroui logo

HackTool - Rubeus Execution - ScriptBlock

Sigma Rules

View Source
Summary
This detection rule targets the execution of Rubeus, a known hack tool used for various Kerberos-related attacks, particularly focusing on credential theft and lateral movement within Windows environments. It leverages specific command line arguments that are characteristic of Rubeus operations. The detection relies on PowerShell Script Block Logging, which must be enabled to properly capture and analyze scripts executed in the PowerShell environment. The rule identifies potentially malicious activities by searching for keywords commonly associated with Rubeus functionalities, such as 'asreproast', 'kerberoast', and ticket manipulation commands. If any of the specified script block text fragments are detected, the alert will trigger, signaling a high-level threat that requires investigation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Script
Created: 2023-04-27