Powershell Directory Enumeration (162e69a7-7981-4344-84a9-0f1c9a217a52)
Detects technique used by MAZE ransomware to enumerate directories using Powershell
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) | Attack Pattern | Powershell Directory Enumeration (162e69a7-7981-4344-84a9-0f1c9a217a52) | Sigma-Rules | 1 |