Skip to content

Hide Navigation Hide TOC

Suspicious PowerShell Download and Execute Pattern (e6c54d94-498c-4562-a37c-b469d8e9a275)

Detects suspicious PowerShell download patterns that are often used in malicious scripts, stagers or downloaders (make sure that your backend applies the strings case-insensitive)

Cluster A Galaxy A Cluster B Galaxy B Level
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern Suspicious PowerShell Download and Execute Pattern (e6c54d94-498c-4562-a37c-b469d8e9a275) Sigma-Rules 1
PowerShell - T1059.001 (970a3432-3237-47ad-bcca-7d8cbb217736) Attack Pattern Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern 2