
Rule Info
Name
Potential Binary Or Script Dropper Via PowerShell
Author
frack113, Nasreddine Bencherchali (Nextron Systems)
Description
Detects PowerShell creating a binary executable or a script file.
Reference
Date
2023-03-17 00:00:00
Modified
2025-03-05 00:00:00
Id
7047d730-036f-4f40-b9d8-1c63e36d5e62
Tags
attack.persistence
Type
Community Rule
Link to Public Repo
Rule History
Author
Title
Date
Commit
Swachchhanda Shrawan Poudel
Merge PR #5224 from @swachchhanda000 - Fix Multiple FPs
2025-04-07
Nasreddine Bencherchali
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
2024-08-12
github-actions[bot]
Merge PR #4791 from @nasbench - Promote older rules status from `experimental` to `test`
2024-04-01
Nasreddine Bencherchali
feat: new rules, updates and goofy guineapig stuff (#4229)
2023-05-15
frack113
feat: new rule `Potential Binary Or Script Dropper Via PowerShell.EXE` (#4116)
2023-03-17