kqlElastic-2.0from elastic/detection-rules
PowerShell Suspicious Payload Encoded and Compressed
Quality
92
FP risk
—
Forks
0
Views
0
Rule sourcerules/windows/defense_evasion_posh_compressed.toml
event.category:process and host.os.type:windows and
powershell.file.script_block_entropy_bits >= 4.5 and
powershell.file.script_block_text : (
(
"System.IO.Compression.DeflateStream" or
"System.IO.Compression.GzipStream" or
"IO.Compression.DeflateStream" or
"IO.Compression.GzipStream"
) and
FromBase64String
) and
not user.id : "S-1-5-18"