kqlElastic-2.0from elastic/detection-rules
Suspicious Portable Executable Encoded in Powershell Script
Quality
92
FP risk
—
Forks
0
Views
0
Rule sourcerules/windows/execution_posh_portable_executable.toml
event.category:process and host.os.type:windows and
powershell.file.script_block_text : (
TVqQAAMAAAAEAAAA
) and not user.id : "S-1-5-18"