MalwareBazaar Database
This page shows some basic information the YARA rule Empire_PowerShell_Framework_Gen5_RID3392 including corresponding malware samples.
Database Entry
| YARA Rule: | Empire_PowerShell_Framework_Gen5_RID3392 |
|---|---|
| Author: | Florian Roth |
| Description: | Detects Empire component - from files Invoke-CredentialInjection.ps1, Invoke-PSInject.ps1, Invoke-ReflectivePEInjection.ps1 |
| Firstseen: | 2022-04-20 12:04:01 UTC |
| Lastseen: | 2025-08-25 08:03:57 UTC |
| Sightings: | 4 |
Malware Samples
The table below shows all malware samples that matching this particular YARA rule (max 1000).
| Firstseen (UTC) | SHA256 hash | Tags | Signature | Reporter |
|---|