Here's some #powershell that will melt your face off:https://pastebin.com/P5AK7div
-
-
Replying to @James_inthe_box
3 parts code, with the 3rd part as powershell backdoor https://ghostbin.com/paste/p6j9n ; decoded proxys and ip https://ghostbin.com/paste/kdzg5and . Interesting the function isDeugEnv that shutdowns pc if one of the processes are found cc:
@ItsReallyNick@bartblazepic.twitter.com/6i1Ho9Z4zX
2 replies 6 retweets 14 likes -
Replying to @gN3mes1s @James_inthe_box and
Giuseppe `N3mes1s` Retweeted ReaQta
ok, i remebered something similar. It's related to this one https://blog.malwarebytes.com/threat-analysis/2017/09/elaborate-scripting-fu-used-in-espionage-attack-against-saudi-arabia-government_entity/ … I see similarities with the behaviour of the attack chain, like the vbs and ps1 with attrib +s +h, or the list of proxy and functions.https://twitter.com/ReaQta/status/909799626730901504 …
Giuseppe `N3mes1s` added,
1 reply 0 retweets 3 likes -
-
and now i'm pretty sure it's the same "actor" : same persistence entry/key > persistency entry called WindowsOptimizationspic.twitter.com/ktxKBJ1Sui
2 replies 0 retweets 1 like
This smells like the OilRig actor to me. Thanks, will take a peek!
-
-
i was thinking the same, i need to find a confirmation
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.