Skip to content

<<< Hide Navigation Hide TOC >>>

PowerShell Base64 Encoded FromBase64String Cmdlet (fdb62a13-9a81-4e5c-a38f-ea93a16f6d7c)

Detects usage of a base64 encoded "FromBase64String" cmdlet in a process command line

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 3
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern PowerShell Base64 Encoded FromBase64String Cmdlet (fdb62a13-9a81-4e5c-a38f-ea93a16f6d7c) Sigma-Rules 1
Deobfuscate/Decode Files or Information - T1140 (3ccef7ae-cb5e-48f6-8302-897105fbf55c) Attack Pattern PowerShell Base64 Encoded FromBase64String Cmdlet (fdb62a13-9a81-4e5c-a38f-ea93a16f6d7c) Sigma-Rules 1
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern 2