ET HUNTING Suspected Malicious Powershell Script (Inbound)Source: et/open
alert http $EXTERNAL_NET any -> $HOME_NET any (msg:"ET HUNTING Suspected Malicious Powershell Script (Inbound)"; flow:established,to_client; file.data; content:"set-strictmode -"; nocase; fast_pattern; content:"GetAssemblies"; distance:0; nocase; content:"|5b 5d 5d 24|"; distance:0; content:"GetDelegateForFunctionPointer"; distance:0; nocase; classtype:bad-unknown; sid:2049234; rev:1; metadata:attack_target Client_Endpoint, created_at 2023_11_16, deployment Perimeter, former_category HUNTING, performance_impact Low, confidence Medium, signature_severity Informational, updated_at 2023_11_16; target:dest_ip;)
Metadata
attack_targetClient_Endpoint
created_at2023_11_16
deploymentPerimeter
former_categoryHUNTING
performance_impactLow
confidenceMedium
signature_severityInformational
updated_at2023_11_16