
Summary
This rule is focused on detecting the use of Powercat, a PowerShell utility that mimics the functionality of Netcat by enabling network communication over non-application layer protocols. Adversaries may utilize Powercat to establish command and control (C2) communications with compromised systems, allowing for the transmission of data and other malicious activities. The detection logic monitors for specific strings associated with the execution of Powercat scripts in the Windows environment, particularly focusing on the invocation of 'powercat' and 'powercat.ps1'. By identifying these strings, defenders can potentially catch malicious actors attempting to use Powercat to communicate with their C2 servers or among infected hosts. The rule targets PowerShell commands invoked in a classic execution context, reflecting a common method of PowerShell exploitation in Windows systems. As such, it serves as an important protective measure against unauthorized command and control communications that bypass typical application layer protocols.
Categories
- Windows
- Endpoint
Data Sources
- Script
- Process
ATT&CK Techniques
- T1095
Created: 2021-07-21