07-13-2022 05:16 AM
For a long time I received many alerts about the Powershell being indentified as Malware, when a retrospective Malware alert was received making that file as Clean.
Common detecion: W32.PowershellEncodedBuffer.ioc
Did anyone else see this same behavior?
Solved! Go to Solution.
11-28-2022 12:14 AM
Hello @hell ,
there are two options.
Greetings,
Thorsten
07-15-2022 02:00 AM
Hello @Hellen Queiros Brito ,
FYI, the IOC does not outline that Powershell itself is malware, it outlines that something malicious may has been done with powershell. This IOC has been seen often in the past. It outlines, in most cases, that the command line includes a base64 encoded string. This technique can be used to hide something. This technique is also described by MITRE to obfuscate something.
Two things:
Greetings,
Thorsten
11-25-2022 11:38 AM
Hello @Troja007 .
Yes it's right. Shows as severety level low and it's was encoded too.
and what can we do in this case, I still receive several alerts regarding the PS and in another topic on the cisco blog it was mentioned that an isolated case would not be serious, but several alerts would already become worrying, relating to cases of LOLBins
Thank you for your help!!
11-28-2022 12:14 AM
Hello @hell ,
there are two options.
Greetings,
Thorsten
11-28-2022 12:55 PM
Thank you @Troja007
11-29-2022 01:36 AM
Hello @Hellen Queiros Brito ,
FYI, custom CloudIOC exclusions have been released. They are handled and configured in the same way as any other exclusions.
Greetings,
Thorsten
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide