Windows PowerShell PSAsyncShell asynchronous TCP reverse shell
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Goal
Detects execution of PSAsyncShell PowerShell commands used for establishing persistent asynchronous TCP reverse shells.
Strategy
This rule monitors PowerShell script block logging through @Event.EventData.Data.ScriptBlockText
for PSAsyncShell command patterns. PSAsyncShell is a PowerShell-based asynchronous reverse shell tool that creates persistent command and control channels through outbound TCP connections.
Asynchronous reverse shells maintain command execution capabilities even during intermittent connectivity, making detection and disruption more difficult. These shells typically establish outbound connections that bypass firewall rules that block inbound connections, allowing attackers to maintain persistent access to compromised systems.
Triage & Response
- Examine the complete PowerShell command and execution context on
{{host}}
. - Analyze network connections for suspicious outbound TCP traffic to unusual destinations.
- Review PowerShell session history for additional commands executed before and after detection.
- Check startup locations and scheduled tasks for persistence mechanisms.
- Monitor for data transfers occurring through the shell connection.
- Isolate
{{host}}
from the network to prevent command and control communication. - Reset any potentially compromised account credentials.