<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Malware &amp; Endpoint on Hello w3nch</title><link>https://w3nch.github.io/categories/malware--endpoint/</link><description>Recent content in Malware &amp; Endpoint on Hello w3nch</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Tue, 03 Feb 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://w3nch.github.io/categories/malware--endpoint/index.xml" rel="self" type="application/rss+xml"/><item><title>SOC153 Case Study: Malicious PowerShell Execution Leading to Active Malware Infection</title><link>https://w3nch.github.io/writeups/letsdefend/alerts/soc153---suspicious-powershell-script-executedname/</link><pubDate>Tue, 03 Feb 2026 00:00:00 +0000</pubDate><guid>https://w3nch.github.io/writeups/letsdefend/alerts/soc153---suspicious-powershell-script-executedname/</guid><description>Event ID: 238
Rule Name: SOC153 – Suspicious PowerShell Script Executed
Severity: HIGH
Category: Endpoint Compromise / Malware
Event Time: March 14, 2024 – 05:23 PM
Compromised Host: Tony (172.16.17.206)
Tony at work opened a suspicious file they probably shouldn&amp;rsquo;t have. It was like finding a strange USB drive in the parking lot and plugging it into your computer you don&amp;rsquo;t know what&amp;rsquo;s on it, but it starts doing things automatically.</description></item></channel></rss>