You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Malicious files are often encoded in an attempt to bypass security controls that would otherwise inspect the contents of said file. An attacker would then need to decode the malicious file for use on the victim machine using a utility such as certutil or the base64 command. This rule supports detection for standard decoding utilities on Unix, Windows cmd, Windows PowerShell, and MacOS.
Additional Details
Detail
Value
Type
Templated Match
Category
Defense Evasion
Apply Risk to Entities
device_hostname, device_ip, user_username
Signal Name
Base64 Decode in Command Line
Summary Expression
A base64-encoded file was decoded on host {{device_hostname}} by user {{user_username}}