Windows PowerShell PSAsyncShell asynchronous TCP reverse shell

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects execution of PSAsyncShell PowerShell commands used for establishing persistent asynchronous TCP reverse shells.

Strategy

This rule monitors PowerShell script block logging through @Event.EventData.Data.ScriptBlockText for PSAsyncShell command patterns. PSAsyncShell is a PowerShell-based asynchronous reverse shell tool that creates persistent command and control channels through outbound TCP connections.

Asynchronous reverse shells maintain command execution capabilities even during intermittent connectivity, making detection and disruption more difficult. These shells typically establish outbound connections that bypass firewall rules that block inbound connections, allowing attackers to maintain persistent access to compromised systems.

Triage & Response

  • Examine the complete PowerShell command and execution context on {{host}}.
  • Analyze network connections for suspicious outbound TCP traffic to unusual destinations.
  • Review PowerShell session history for additional commands executed before and after detection.
  • Check startup locations and scheduled tasks for persistence mechanisms.
  • Monitor for data transfers occurring through the shell connection.
  • Isolate {{host}} from the network to prevent command and control communication.
  • Reset any potentially compromised account credentials.