PowerShell Base64 Encoded Command Execution
Contexto
APTs
Simulação do ataque

Eventos gerados

Regra de detecção
Last updated


Last updated
title: PowerShell Base64-Encoded Command Execution
id: fa18e58e-35b9-45c2-bf07-30c1b4a5235a
status: experimental
description: Detecta a execução de comando PowerShell codificado em Base64
author: Sg0luc
date: 2023-09-06
modified: 2025-05-03
references:
- https://attack.mitre.org/techniques/T1027/
tags:
- attack.defense-evasion
- attack.t1027
logsource:
product: windows
category: powershell
detection:
Event:
ScriptBlockText|contains:
- '-Enc' # -Enc ou -EncodedCommand
condition: Event
falsepositives:
- Serviços automatizados que executam comandos codificados em Base64 de forma legítima
level: high
fields:
- SubjectUserName
- SourceAddress
- CommandLine