Encrypted/Encoded File
Adversaries may encrypt or encode files to obfuscate strings, bytes, and other specific patterns to impede detection. Encrypting and/or encoding file content aims to conceal malicious artifacts within a file used in an intrusion. Many other techniques, such as [Software Packing](https://attack.mitre.org/techniques/T1027/002), [Steganography](https://attack.mitre.org/techniques/T1027/003), and [Embedded Payloads](https://attack.mitre.org/techniques/T1027/009), share this same broad objective. Enc...
BY SOURCE
PROCEDURES (7)
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for evasion
Auto-extracted: 1 detections for process creation monitoring