Windows PowerShell PSAsyncShell asynchronous TCP reverse shell
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Goal
Detects execution of PSAsyncShell PowerShell commands used for establishing persistent asynchronous TCP reverse shells.
Strategy
This rule monitors PowerShell script block logging through @Event.EventData.Data.ScriptBlockText
for PSAsyncShell command patterns. PSAsyncShell is a PowerShell-based asynchronous reverse shell tool that creates persistent command and control channels through outbound TCP connections.
Asynchronous reverse shells maintain command execution capabilities even during intermittent connectivity, making detection and disruption more difficult. These shells typically establish outbound connections that bypass firewall rules that block inbound connections, allowing attackers to maintain persistent access to compromised systems.
Triage & Response
- Examine the complete PowerShell command and execution context on
{{host}}
. - Analyze network connections for suspicious outbound TCP traffic to unusual destinations.
- Review PowerShell session history for additional commands executed before and after detection.
- Check startup locations and scheduled tasks for persistence mechanisms.
- Monitor for data transfers occurring through the shell connection.
- Isolate
{{host}}
from the network to prevent command and control communication. - Reset any potentially compromised account credentials.