heroui logo

Sliver C2 Implant Activity Pattern

Anvilogic Forge

View Source
Summary
This detection rule focuses on identifying malicious activity associated with the Sliver Command and Control (C2) framework, particularly when it exploits PowerShell for command execution. Adversaries often leverage command-line interfaces and scripting languages to execute malicious commands, scripts, or binaries on compromised systems. The rule specifically targets patterns in process activity that are indicative of Sliver implants, which may misuse PowerShell to execute commands. The detection logic captures events related to PowerShell events with specific Event IDs (4103 and 4104) and monitors for certain parameters typically used in command execution. Overall, this rule aims to enhance visibility into suspicious PowerShell usage that could signal a Sliver C2 implant operation.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
  • Application Log
  • Command
ATT&CK Techniques
  • T1059
Created: 2024-02-09