<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Powershell &#8211; Cerbero Blog</title>
	<atom:link href="https://blog.cerbero.io/tag/powershell/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.cerbero.io</link>
	<description></description>
	<lastBuildDate>Thu, 02 Apr 2026 12:36:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.cerbero.io/wp-content/uploads/2023/09/cropped-pro_icon_512-32x32.png</url>
	<title>Powershell &#8211; Cerbero Blog</title>
	<link>https://blog.cerbero.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">184292133</site>	<item>
		<title>PowerShell Beautifier 4.0 Package</title>
		<link>https://blog.cerbero.io/powershell-beautifier-4-0-package/</link>
					<comments>https://blog.cerbero.io/powershell-beautifier-4-0-package/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 12:36:06 +0000</pubDate>
				<category><![CDATA[Package]]></category>
		<category><![CDATA[Deobfuscation]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=3351</guid>

					<description><![CDATA[We are happy to announce version 4.0 of the PowerShell Beautifier package. This is a major release. Previous versions relied on a custom tokenizer which, lacking knowledge of the language grammar, could not always correctly classify tokens. This required extensive workaround code and inevitably led to edge cases where deobfuscation would fail. Version 4.0 replaces &#8230; <a href="https://blog.cerbero.io/powershell-beautifier-4-0-package/" class="more-link">Continue reading<span class="screen-reader-text"> "PowerShell Beautifier 4.0 Package"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/powershell-beautifier-4-0-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3351</post-id>	</item>
		<item>
		<title>Extreme PowerShell Obfuscation</title>
		<link>https://blog.cerbero.io/extreme-powershell-obfuscation/</link>
					<comments>https://blog.cerbero.io/extreme-powershell-obfuscation/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Wed, 17 May 2023 07:41:37 +0000</pubDate>
				<category><![CDATA[Package]]></category>
		<category><![CDATA[Reversing]]></category>
		<category><![CDATA[Deobfuscation]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2709</guid>

					<description><![CDATA[We recently stumbled upon an old article by Daisuke Mutaguchi explaining an extreme technique for PowerShell obfuscation. The article is in Japanese, so you may have to use Google translate. Here&#8217;s the final example provided by the author of the article: ${;}=+$();${=}=${;};${+}=++${;};${@}=++${;};${.}=++${;};${[}=++${;}; ${]}=++${;};${(}=++${;};${)}=++${;};${&#38;}=++${;};${&#124;}=++${;}; ${&#34;}=&#34;[&#34;+&#34;$(@{})&#34;[${)}]+&#34;$(@{})&#34;[&#34;${+}${&#124;}&#34;]+&#34;$(@{})&#34;[&#34;${@}${=}&#34;]+&#34;$?&#34;[${+}]+&#34;]&#34;; ${;}=&#34;&#34;.(&#34;$(@{})&#34;[&#34;${+}${[}&#34;]+&#34;$(@{})&#34;[&#34;${+}${(}&#34;]+&#34;$(@{})&#34;[${=}]+&#34;$(@{})&#34;[${[}]+&#34;$?&#34;[${+}]+&#34;$(@{})&#34;[${.}]); ${;}=&#34;$(@{})&#34;[&#34;${+}${[}&#34;]+&#34;$(@{})&#34;[${[}]+&#34;${;}&#34;[&#34;${@}${)}&#34;]; &#34;${&#34;}${.}${[}+${&#34;}${)}${@}+${&#34;}${+}${=}${+}+${&#34;}${+}${=}${&#38;}+${&#34;}${+}${=}${&#38;}+${&#34;}${+}${+}${+}+${&#34;}${[}${[}+${&#34;}${.}${@}+${&#34;}${+}${+}${&#124;}+${&#34;}${+}${+}${+}+${&#34;}${+}${+}${[}+${&#34;}${+}${=}${&#38;}+${&#34;}${+}${=}${=}+${&#34;}${.}${.}+${&#34;}${.}${[}&#124;${;}&#34;&#124;&#38;${;}; Yes, this is valid PowerShell. Although there are &#8230; <a href="https://blog.cerbero.io/extreme-powershell-obfuscation/" class="more-link">Continue reading<span class="screen-reader-text"> "Extreme PowerShell Obfuscation"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/extreme-powershell-obfuscation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2709</post-id>	</item>
		<item>
		<title>PowerShell Malware with x64 Shellcode</title>
		<link>https://blog.cerbero.io/powershell-malware-with-x64-shellcode/</link>
					<comments>https://blog.cerbero.io/powershell-malware-with-x64-shellcode/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Wed, 10 May 2023 08:05:21 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Reversing]]></category>
		<category><![CDATA[Emulator]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Silicon]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2682</guid>

					<description><![CDATA[This malware gives us a chance to see the recently introduced Silicon Shellcode Emulator in action. SHA256: 8CF1E49C74FB05DE954A6B70281F47E3CBD021108B0EE11F4A59667FF28BFEE9 The PowerShell code is not obfuscated: it decodes a base64 encoded string, decrypts the result with a xor operation, allocates memory with VirtualAlloc, copies the shellcode to the allocated memory and then executes it. If ([IntPtr]::size -eq &#8230; <a href="https://blog.cerbero.io/powershell-malware-with-x64-shellcode/" class="more-link">Continue reading<span class="screen-reader-text"> "PowerShell Malware with x64 Shellcode"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/powershell-malware-with-x64-shellcode/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2682</post-id>	</item>
		<item>
		<title>OneNote Malware With ISO File</title>
		<link>https://blog.cerbero.io/onenote-malware-with-iso-file/</link>
					<comments>https://blog.cerbero.io/onenote-malware-with-iso-file/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Tue, 09 May 2023 09:56:37 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Reversing]]></category>
		<category><![CDATA[chm]]></category>
		<category><![CDATA[ISO]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Multistage]]></category>
		<category><![CDATA[OneNote]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2675</guid>

					<description><![CDATA[We recently stumbled upon this tweet by @Cryptolaemus1 about a malicious OneNote document with an embedded ISO file. Because of our recently released ISO Format package, we thought it would be interesting to analyze this malware sample with Cerbero Suite. SHA256: 2B0B2A15F00C6EED533C70E89001248A0F2BA6FAE5102E1443D7451A59023516 The unidentified embedded object in the OneNote document is an ISO file. We &#8230; <a href="https://blog.cerbero.io/onenote-malware-with-iso-file/" class="more-link">Continue reading<span class="screen-reader-text"> "OneNote Malware With ISO File"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/onenote-malware-with-iso-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2675</post-id>	</item>
		<item>
		<title>Reversing Complex PowerShell Malware</title>
		<link>https://blog.cerbero.io/reversing-complex-powershell-malware/</link>
					<comments>https://blog.cerbero.io/reversing-complex-powershell-malware/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Tue, 28 Mar 2023 10:21:28 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[beautifier]]></category>
		<category><![CDATA[Injection]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Reversing]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2617</guid>

					<description><![CDATA[In this post we&#8217;re going to analyze a multi-stage PowerShell malware, which gives us an opportunity to use our commercial PowerShell Beautifier package and its capability to replace variables. Sample SHA2-256: 2840D561ED4F949D7D1DADD626E594B9430DEEB399DB5FF53FC0BB1AD30552AA Interestingly, the malicious script is detected by only 6 out of 58 engines on VirusTotal. We open the script in Cerbero Suite, decode &#8230; <a href="https://blog.cerbero.io/reversing-complex-powershell-malware/" class="more-link">Continue reading<span class="screen-reader-text"> "Reversing Complex PowerShell Malware"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/reversing-complex-powershell-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2617</post-id>	</item>
		<item>
		<title>PowerShell Beautifier 2.0 Package</title>
		<link>https://blog.cerbero.io/powershell-beautifier-2-0/</link>
					<comments>https://blog.cerbero.io/powershell-beautifier-2-0/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Mon, 20 Mar 2023 13:42:32 +0000</pubDate>
				<category><![CDATA[Package]]></category>
		<category><![CDATA[Deobfuscation]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2606</guid>

					<description><![CDATA[We have released version 2.0 of our commercial PowerShell Beautifier package. The new release adds the option to remove unused variables. For example, this is a snippet of a malicious script: $T = &#039;Get&#039; $M = $T + &#039;Method&#039; $I = &#039;Invoke&#039; $T = $T + &#039;Type&#039; $L = &#039;Load&#039; $Q0 = [Reflection.Assembly] $B = &#8230; <a href="https://blog.cerbero.io/powershell-beautifier-2-0/" class="more-link">Continue reading<span class="screen-reader-text"> "PowerShell Beautifier 2.0 Package"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/powershell-beautifier-2-0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2606</post-id>	</item>
		<item>
		<title>RedLine Stealer Dropper</title>
		<link>https://blog.cerbero.io/redline-stealer-dropper/</link>
					<comments>https://blog.cerbero.io/redline-stealer-dropper/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Tue, 07 Mar 2023 11:53:28 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Reversing]]></category>
		<category><![CDATA[.NET]]></category>
		<category><![CDATA[Batch]]></category>
		<category><![CDATA[Deobfuscator]]></category>
		<category><![CDATA[Dropper]]></category>
		<category><![CDATA[Emulator]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Multistage]]></category>
		<category><![CDATA[OneNote]]></category>
		<category><![CDATA[Payload]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2542</guid>

					<description><![CDATA[An interesting sample containing a number of different obfuscation techniques. In this article we analyze the dropper in detail and reach the final stage. SHA256: 0B93B5287841CEF2C6B2F2C3221C59FFD61BF772CD0D8B2BDAB9DADEB570C7A6 The first file we encounter is a OneNote document. If the &#8220;OneNote Format&#8221; package is installed, all files are automatically extracted. Among the extracted files there are two unidentified &#8230; <a href="https://blog.cerbero.io/redline-stealer-dropper/" class="more-link">Continue reading<span class="screen-reader-text"> "RedLine Stealer Dropper"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/redline-stealer-dropper/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2542</post-id>	</item>
		<item>
		<title>PowerShell Beautifier Package</title>
		<link>https://blog.cerbero.io/powershell-beautifier-package/</link>
					<comments>https://blog.cerbero.io/powershell-beautifier-package/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Thu, 02 Mar 2023 11:35:41 +0000</pubDate>
				<category><![CDATA[Package]]></category>
		<category><![CDATA[beautifier]]></category>
		<category><![CDATA[Deobfuscation]]></category>
		<category><![CDATA[Powershell]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2533</guid>

					<description><![CDATA[PowerShell code is often seen in malware. To help the analysis of such code we have just released the &#8220;PowerShell Beautifier&#8221; package. The package is available to all commercial licenses of Cerbero Suite Advanced. The package features a complete parser for the PowerShell language and has many deobfuscation capabilities. If your organization is interested in &#8230; <a href="https://blog.cerbero.io/powershell-beautifier-package/" class="more-link">Continue reading<span class="screen-reader-text"> "PowerShell Beautifier Package"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/powershell-beautifier-package/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2533</post-id>	</item>
		<item>
		<title>A Fun CTF-Like Malware</title>
		<link>https://blog.cerbero.io/a-fun-ctf-like-malware/</link>
					<comments>https://blog.cerbero.io/a-fun-ctf-like-malware/#respond</comments>
		
		<dc:creator><![CDATA[Erik Pistelli]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 13:07:14 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[chm]]></category>
		<category><![CDATA[Encrypted]]></category>
		<category><![CDATA[lnk]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[MSCrypto]]></category>
		<category><![CDATA[OLE]]></category>
		<category><![CDATA[Powershell]]></category>
		<category><![CDATA[Reversing]]></category>
		<category><![CDATA[Steganography]]></category>
		<category><![CDATA[VBA]]></category>
		<guid isPermaLink="false">https://blog.cerbero.io/?p=2224</guid>

					<description><![CDATA[From a Twitter post by InQuest, we analyzed an interesting malware: Encrypted MS Office Document, VBA, Windows Link File (LNK), OLE objects, Windows Help Files (CHM), PNG steganography and Powershell. SHA256: 46AFA83E0B43FDB9062DD3E5FB7805997C432DD96F09DDF81F2162781DAAF834 The analysis should take about 15-20 minutes in Cerbero Suite. Highly recommended! SPOILER ALERT: The images below show all the steps of our &#8230; <a href="https://blog.cerbero.io/a-fun-ctf-like-malware/" class="more-link">Continue reading<span class="screen-reader-text"> "A Fun CTF-Like Malware"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/a-fun-ctf-like-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2224</post-id>	</item>
	</channel>
</rss>
