← Back to SOC feed Coverage →

Decode Base64 Encoded Text

sigma LOW SigmaHQ
T1027
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may use base64 decoding to obfuscate malicious payloads or exfiltrate data, making it a potential indicator of command and control activity. Proactively hunting for base64 decoding in Azure Sentinel can help identify covert communication or data exfiltration attempts that evade basic detection mechanisms.

Detection Rule

Sigma (Original)

title: Decode Base64 Encoded Text
id: e2072cab-8c9a-459b-b63c-40ae79e27031
status: test
description: Detects usage of base64 utility to decode arbitrary base64-encoded text
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2021-11-27
tags:
    - attack.defense-evasion
    - attack.t1027
logsource:
    category: process_creation
    product: linux
detection:
    selection:
        Image|endswith: '/base64'
        CommandLine|contains: '-d' # Also covers "--decode"
    condition: selection
falsepositives:
    - Legitimate activities
level: low

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/base64" and TargetProcessCommandLine contains "-d"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_base64_decode.yml