MalwareBazaar Database
This page shows some basic information the YARA rule OBFUS_PowerShell_Execution including corresponding malware samples.
Database Entry
| YARA Rule: | OBFUS_PowerShell_Execution |
|---|---|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects some variations of obfuscated PowerShell code to execute further PowerShell code |
| Firstseen: | 2022-03-15 11:50:24 UTC |
| Lastseen: | 2025-10-07 14:28:20 UTC |
| Sightings: | 22 |
Malware Samples
The table below shows all malware samples that matching this particular YARA rule (max 1000).
| Firstseen (UTC) | SHA256 hash | Tags | Signature | Reporter |
|---|