<<< Hide Navigation Hide TOC >>>
Obfuscated PowerShell OneLiner Execution (44e24481-6202-4c62-9127-5a0ae8e3fe3d)
Detects the execution of a specific OneLiner to download and execute powershell modules in memory.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | Obfuscated PowerShell OneLiner Execution (44e24481-6202-4c62-9127-5a0ae8e3fe3d) | Sigma-Rules | 1 |
Disable or Modify Tools - T1562.001 (ac08589e-ee59-4935-8667-d845e38fe579) | Attack Pattern | Obfuscated PowerShell OneLiner Execution (44e24481-6202-4c62-9127-5a0ae8e3fe3d) | Sigma-Rules | 1 |
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) | Attack Pattern | PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) | Attack Pattern | 2 |
Impair Defenses - T1562 (3d333250-30e4-4a82-9edc-756c68afc529) | Attack Pattern | Disable or Modify Tools - T1562.001 (ac08589e-ee59-4935-8667-d845e38fe579) | Attack Pattern | 2 |