Try in Splunk Security Cloud

Description

The following analytic story providers visibility into the latest adversary TTPs in regard to the use of Sliver. Sliver has gained more traction with adversaries as it is often seen as an alternative to Cobalt Strike. It is designed to be scalable and can be used by organizations of all sizes to perform security testing. Sliver is highly modular and contains an Extension package manager (armory) allowing easy install (automatic compilation) of various 3rd party tools such as BOFs and .NET tooling like Ghostpack (Rubeus, Seatbelt, SharpUp, Certify, and so forth) (CyberReason,2023).

  • Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
  • Datamodel: Endpoint
  • Last Updated: 2023-01-24
  • Author: Michael Haag, Splunk
  • ID: 8c2e2cba-3fd8-424f-a890-5080bdaf3f31

Narrative

Sliver is an open source cross-platform adversary emulation/red team framework produced by BishopFox.

Detections

Name Technique Type
Notepad with no Command Line Arguments Process Injection TTP
Windows Process Injection into Notepad Process Injection, Portable Executable Injection Anomaly
Windows Service Create SliverC2 System Services, Service Execution TTP

Reference

source | version: 1