Permalink
Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.
Sign up
Find file
Copy path
sigma/rules/windows/process_creation/win_powershell_frombase64string.yml
Find file
Copy path
Fetching contributors…
Cannot retrieve contributors at this time.
Cannot retrieve contributors at this time
| title: FromBase64String Command Line | |
| id: e32d4572-9826-4738-b651-95fa63747e8a | |
| status: experimental | |
| description: Detects suspicious FromBase64String expressions in command line arguments | |
| references: | |
| - https://gist.github.com/Neo23x0/6af876ee72b51676c82a2db8d2cd3639 | |
| author: Florian Roth | |
| date: 2020/01/29 | |
| tags: | |
| - attack.t1027 | |
| - attack.defense_evasion | |
| logsource: | |
| category: process_creation | |
| product: windows | |
| detection: | |
| selection: | |
| CommandLine|contains: '::FromBase64String(' | |
| condition: selection | |
| falsepositives: | |
| - Administrative script libraries | |
| level: high |