Tag
Potential PowerShell Obfuscated Script via High Entropy
2 rules 3 TTPsThis detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.
Right-to-Left Override Character Used for Defense Evasion
2 rules 1 TTPAdversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.
Detection of Obfuscated IP Address Usage in Download Commands
2 rules 2 TTPsThis brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.
Detection of Invoke-Obfuscation via Standard Input
2 rules 2 TTPsThis brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.
PowerShell Obfuscation via Concatenated Dynamic Command Invocation
2 rules 1 TTPThis rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.
Invoke-Obfuscation via Clip.exe
2 rules 2 TTPsThe use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.
PowerShell Obfuscation via String Concatenation
2 rules 1 TTPThis rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.
PowerShell Obfuscation via Character Array Reconstruction
2 rules 1 TTPDetects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.
Potential PowerShell Obfuscation via Special Character Overuse
2 rules 3 TTPsThis rule detects PowerShell scripts heavily obfuscated with whitespace and special characters, often used to evade static analysis and AMSI, by identifying scripts with low symbol diversity and a high proportion of whitespace and special characters.
Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell
2 rules 2 TTPsAttackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.
Command Obfuscation via Unicode Modifier Letters
2 rules 1 TTPAdversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.
PowerShell Obfuscation via Backtick-Escaped Variable Expansion
2 rules 1 TTPPowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.