Files
blue-team-tools/rules/windows/powershell/powershell_classic/powershell_xor_commandline.yml
T
2022-01-06 14:02:35 +01:00

28 lines
741 B
YAML

title: Suspicious XOR Encoded PowerShell Command Line
id: 812837bb-b17f-45e9-8bd0-0ec35d2e3bd6
description: Detects suspicious powershell process which includes bxor command, alternative obfuscation method to b64 encoded commands.
status: experimental
author: Teymur Kheirkhabarov, Harish Segar (rule)
date: 2020/06/29
modified: 2021/10/16
tags:
- attack.execution
- attack.t1059.001
- attack.t1086 #an old one
logsource:
product: windows
category: ps_classic_start
definition: fields have to be extract from event
detection:
selection:
HostName: 'ConsoleHost'
filter:
HostApplication|contains:
- 'bxor'
- 'join'
- 'char'
condition: selection and filter
falsepositives:
- unknown
level: medium