Potential Binary Or Script Dropper Via PowerShell

Rule Info

Name
Potential Binary Or Script Dropper Via PowerShell
Author
frack113, Nasreddine Bencherchali (Nextron Systems)
Description
Detects PowerShell creating a binary executable or a script file.
Date
2023-03-17 00:00:00
Modified
2023-05-09 00:00:00
Id
7047d730-036f-4f40-b9d8-1c63e36d5e62
Tags
attack.persistence DEMO
Type
Community Rule

Rule History

Author
Title
Date
Commit
github-actions[bot]
Merge PR #4791 from @nasbench - Promote older rules status from `experimental` to `test`
2024-04-01
Wagga
Merge PR #4524 from @wagga40 - Fix Typos In Metadata Fields
2023-10-28
Nasreddine Bencherchali
feat: new rules, updates and goofy guineapig stuff (#4229)
2023-05-15
frack113
feat: new rule `Potential Binary Or Script Dropper Via PowerShell.EXE` (#4116)
2023-03-17