""ET INFO Suspected Malicious Powershell Script (Inbound)""
SID: 2049234
Revision: 1
Class Type: bad-unknown
Metadata: attack_target Client_Endpoint, created_at 2023_11_16, deployment Perimeter, performance_impact Low, confidence Medium, signature_severity Informational, updated_at 2023_11_16
Reference:
Protocol: tcp
Source Network: $EXTERNAL_NET
Source Port: $HTTP_PORTS
Destination Network: $HOME_NET
Destination Port: any
Flow: established,to_client
Contents:
-
Value: "set-strictmode -"
-
Value: "GetAssemblies"
-
Value: "|5b 5d 5d 24|"
-
Value: "GetDelegateForFunctionPointer"
Within:
PCRE:
Special Options:
-
file_data
-
nocase
-
fast_pattern
-
nocase
-
nocase