You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
After looking at the rule in question, it can indeed be improved. The rule focused on using the same args in the ART example in order to cover potential "renames" of the cmdlets. But as its shown by the source code on 3 flags are mandatory.
file: [MANDATORY] The file name to the file to be exfiltrated.
domainName: [MANDATORY] The domain name to use for DNS requests.
password: [MANDATORY] Password used to encrypt the data to be exfiltrated.
And these alone cannot be used to identify the cmdlets. I will work on this and try to enhance the logic a bit more.
Hello!
Just reviewing the DNS exfiltration rule at - https://github.com/SigmaHQ/sigma/blob/master/rules/windows/powershell/powershell_script/posh_ps_invoke_dnsexfiltration.yml and was curious on the detection logic of looking for "Invoke-DNSExfiltrator" OR all of the flags its running with.
Based on the references and the wiki for the tool, it doesn't look like the detection logic is accurate. Could you please confirm?
Kind Regards,
Pramod
The text was updated successfully, but these errors were encountered: