07-06-2023, 03:54 PM
Interesting. thanks
LEAKED C2 SERVER POWERSHELL CODE
by DOJ - Wednesday June 28, 2023 at 10:54 PM
|
07-06-2023, 03:54 PM
Interesting. thanks
07-18-2023, 01:34 AM
puyuo
06-15-2024, 08:17 PM
Thanks for sharing
06-15-2024, 08:18 PM
(06-28-2023, 10:54 PM)DOJ Wrote: The PoshC2 server showed in a previous thread (https://breachforums.hn/Thread-Ransomwar...n-Internet) had a second stage powershell script that I've reorganized and commented (noob-friendly). Enjoy! thank you for this
06-20-2024, 05:43 PM
lets see whats here
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you feel this is incorrect.
06-20-2024, 05:44 PM
thanks comrade, best regards
06-21-2024, 10:42 AM
(This post was last modified: 06-21-2024, 10:43 AM by PulseCipher.)
just dug up the C2 server's IP for this botnet. It's 95.213.145.101. Heads up, it's dodging pings, so don't waste your time there.
Quick rundown of the op: Cert Validation Bypass: Script blows past SSL cert checks. No surprise there, just letting anything through.
C2 IP: Main address is 95.213.145.101, hitting up /wpaas/load.php/
for the payload.
Encryption Key: Comms are wrapped up tight with this key:
qwp0r0wXGPOeyFtIdP6qDHZCynQmtPzP6xkC3xX9sAc=
Good luck intercepting without it.
Payload Ops: Grabs the payload from the C2, decrypts, and runs it if it spots a "key" in there. Could be anything nasty.
Staying Hidden: Configures a web client, sets headers, maybe uses a proxy. Keeps trying to get the payload, doubling wait time between each attempt (30 tries max).
06-21-2024, 11:27 AM
(06-21-2024, 10:42 AM)PulseCipher Wrote: just dug up the C2 server's IP for this botnet. It's 95.213.145.101. Heads up, it's dodging pings, so don't waste your time there. This is good - nice work
06-21-2024, 01:11 PM
(06-21-2024, 11:27 AM)Unethical Wrote:(06-21-2024, 10:42 AM)PulseCipher Wrote: just dug up the C2 server's IP for this botnet. It's 95.213.145.101. Heads up, it's dodging pings, so don't waste your time there. Thanks!
06-21-2024, 03:15 PM
(06-28-2023, 10:54 PM)DOJ Wrote: The PoshC2 server showed in a previous thread (https://breachforums.hn/Thread-Ransomwar...n-Internet) had a second stage powershell script that I've reorganized and commented (noob-friendly). Enjoy! For real let me see, let me see, side bro let me go first? |
« Next Oldest | Next Newest »
|
Possibly Related Threads… | |||||
Thread | Author | Replies | Views | Last Post | |
M-Benz Source Code LEAK !!! | 4 | 897 |
03-17-2025, 01:45 PM Last Post: |
||
Looking for a CraxPro Forum Invitation Code | 0 | 273 |
03-05-2025, 04:46 PM Last Post: |
||
Python code? | 10 | 556 |
02-28-2025, 02:32 PM Last Post: |
||
Riot src code leak | 0 | 412 |
11-06-2024, 11:19 PM Last Post: |
||
All leaked databases in one link? | 7 | 545 |
09-23-2024, 03:13 PM Last Post: |