Skip to main content
Skip to main content
Published Mar 16, 2021 | Updated Mar 24, 2026

HackTool:PowerShell/BloodHound

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

HackTool:PowerShell/BloodHound is a framework designed to identify and visualize complex attack paths within Microsoft Active Directory and Microsoft Entra ID environments. This weaponized tool represents a fundamental change in offensive and defensive strategies by applying graph theory to directory data, treating users, groups, and devices as nodes while permissions and relationships serve as edges. By calculating the shortest path from a compromised account to a high-value target such as a domain administrator, the framework reveals hidden risks that traditional security scanners often overlook.

Originally developed as an open-source project, BloodHound consists of a data collection component, commonly referred to as an ingestor, and a visualization engine that uses a Neo4j graph database. The ingestor, SharpHound, is the primary mechanism for harvesting data from the network. It is deployed as a PowerShell script. While legitimate security professionals use the tool to audit environments and remediate misconfigurations, it has become a staple in the arsenals of sophisticated threat actors. Its presence in a network outside of an authorized audit is a high-fidelity indicator of malicious reconnaissance intended to facilitate lateral movement and privilege escalation. 

  • Deactivate the network adapter or move the compromised host to a quarantined VLAN. Terminate all active sessions for user accounts identified in execution logs.
  • Reset passwords for all accounts that were used on the compromised host or queried by the ingestor. For high-impact environments, rotate the Kerberos Ticket Granting Ticket (KRBTGT) account twice to invalidate any forged Golden Tickets. Change passwords for service accounts that were targeted and consider migrating them to Group Managed Service Accounts (gMSAs) for automated password rotation.
  • Examine %TEMP% and %APPDATA% directories for JSON output files or ZIP archives. If recovered, analyze these files to understand the scope of the threat actor’s network mapping. For heavily impacted devices, perform a complete wipe and reinstall from a known clean backup, as simple binary removal may not eliminate secondary backdoors.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us