atomic-threat-coverage/detection_rules/powershell_shellcode_b64.yml
2019-02-12 04:55:11 +01:00

26 lines
637 B
YAML
Executable File

title: PowerShell ShellCode
status: experimental
description: Detects Base64 encoded Shellcode
references:
- https://twitter.com/cyb3rops/status/1063072865992523776
tags:
- attack.execution
author: David Ledbetter (shellcode), Florian Roth (rule)
date: 2018/11/17
logsource:
product: windows
service: powershell
description: 'Script block logging must be enabled'
detection:
selection:
EventID: 4104
keyword1:
- '*AAAAYInlM*'
keyword2:
- '*OiCAAAAYInlM*'
- '*OiJAAAAYInlM*'
condition: selection and keyword1 and keyword2
falsepositives:
- Unknown
level: critical