title: PowerShell ShellCode id: 16b37b70-6fcf-4814-a092-c36bd3aafcbd status: test description: Detects Base64 encoded Shellcode references: - https://twitter.com/cyb3rops/status/1063072865992523776 author: David Ledbetter (shellcode), Florian Roth (rule) date: 2018/11/17 modified: 2022/12/25 tags: - attack.defense_evasion - attack.privilege_escalation - attack.t1055 - attack.execution - attack.t1059.001 logsource: product: windows category: ps_script definition: 'Requirements: Script Block Logging must be enabled' detection: selection: ScriptBlockText|contains: 'AAAAYInlM' selection2: ScriptBlockText|contains: - 'OiCAAAAYInlM' - 'OiJAAAAYInlM' condition: selection and selection2 falsepositives: - Unknown level: high