Update Script Block Text When Run Phant0m Script
This commit is contained in:
@@ -7,9 +7,9 @@ references:
|
||||
- https://github.com/PowerShellMafia/PowerSploit/blob/d943001a7defb5e0d1657085a77a0e78609be58f/CodeExecution/Invoke-ReflectivePEInjection.ps1
|
||||
- https://github.com/hlldz/Phant0m/blob/30c2935d8cf4aafda17ee2fab7cd0c4aa9a607c2/old/Invoke-Phant0m.ps1
|
||||
- https://gist.github.com/MHaggis/0dbe00ad401daa7137c81c99c268cfb7
|
||||
author: Florian Roth (Nextron Systems), Perez Diego (@darkquassar)
|
||||
author: Florian Roth (Nextron Systems), Perez Diego (@darkquassar), Tuan Le (NCSGroup)
|
||||
date: 2019/02/11
|
||||
modified: 2023/01/02
|
||||
modified: 2023/04/21
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
@@ -25,6 +25,8 @@ detection:
|
||||
- '[Reflection.Assembly]::Load($'
|
||||
- 'System.Reflection.AssemblyName'
|
||||
- 'Reflection.Emit.AssemblyBuilderAccess'
|
||||
- 'Reflection.Emit.CustomAttributeBuilder'
|
||||
- 'Runtime.InteropServices.UnmanagedType'
|
||||
- 'Runtime.InteropServices.DllImportAttribute'
|
||||
- 'SuspendThread'
|
||||
- 'rundll32'
|
||||
|
||||
Reference in New Issue
Block a user