
Summary
This detection rule identifies potentially malicious PowerShell commands that have been intentionally obfuscated through reversal techniques. Attackers often use reversed strings to evade detection mechanisms, thus obscuring their intentions. The rule focuses specifically on PowerShell executable files, targeting instances where the command line includes recognizable reversed keywords that align with common PowerShell commands.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-10-11