LEAKED C2 SERVER POWERSHELL CODE
by DOJ - Wednesday June 28, 2023 at 10:54 PM
#11
Interesting. thanks
Reply
#12
puyuo
Reply
#13
Thanks for sharing
Reply
#14
(06-28-2023, 10:54 PM)DOJ Wrote: The PoshC2 server showed in a previous thread (https://breachforums.hn/Thread-Ransomwar...n-Internet) had a second stage powershell script that I've reorganized and commented (noob-friendly). Enjoy!

thank you for this
Reply
#15
lets see whats here
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you feel this is incorrect.
Reply
#16
thanks comrade, best regards
Reply
#17
just dug up the C2 server's IP for this botnet. It's 95.213.145.101. Heads up, it's dodging pings, so don't waste your time there.
Quick rundown of the op:

Cert Validation Bypass: Script blows past SSL cert checks. No surprise there, just letting anything through.
C2 IP: Main address is 95.213.145.101, hitting up /wpaas/load.php/
for the payload.
Encryption Key: Comms are wrapped up tight with this key:
qwp0r0wXGPOeyFtIdP6qDHZCynQmtPzP6xkC3xX9sAc=
Good luck intercepting without it.
Payload Ops: Grabs the payload from the C2, decrypts, and runs it if it spots a "key" in there. Could be anything nasty.
Staying Hidden: Configures a web client, sets headers, maybe uses a proxy. Keeps trying to get the payload, doubling wait time between each attempt (30 tries max).
Reply
#18
(06-21-2024, 10:42 AM)PulseCipher Wrote: just dug up the C2 server's IP for this botnet. It's 95.213.145.101. Heads up, it's dodging pings, so don't waste your time there.
Quick rundown of the op:

Cert Validation Bypass: Script blows past SSL cert checks. No surprise there, just letting anything through.
C2 IP: Main address is 95.213.145.101, hitting up /wpaas/load.php/
for the payload.
Encryption Key: Comms are wrapped up tight with this key:
qwp0r0wXGPOeyFtIdP6qDHZCynQmtPzP6xkC3xX9sAc=
Good luck intercepting without it.
Payload Ops: Grabs the payload from the C2, decrypts, and runs it if it spots a "key" in there. Could be anything nasty.
Staying Hidden: Configures a web client, sets headers, maybe uses a proxy. Keeps trying to get the payload, doubling wait time between each attempt (30 tries max).

This is good - nice work
Reply
#19
(06-21-2024, 11:27 AM)Unethical Wrote:
(06-21-2024, 10:42 AM)PulseCipher Wrote: just dug up the C2 server's IP for this botnet. It's 95.213.145.101. Heads up, it's dodging pings, so don't waste your time there.
Quick rundown of the op:

Cert Validation Bypass: Script blows past SSL cert checks. No surprise there, just letting anything through.
C2 IP: Main address is 95.213.145.101, hitting up /wpaas/load.php/
for the payload.
Encryption Key: Comms are wrapped up tight with this key:
qwp0r0wXGPOeyFtIdP6qDHZCynQmtPzP6xkC3xX9sAc=
Good luck intercepting without it.
Payload Ops: Grabs the payload from the C2, decrypts, and runs it if it spots a "key" in there. Could be anything nasty.
Staying Hidden: Configures a web client, sets headers, maybe uses a proxy. Keeps trying to get the payload, doubling wait time between each attempt (30 tries max).

This is good - nice work

Thanks!
Reply
#20
(06-28-2023, 10:54 PM)DOJ Wrote: The PoshC2 server showed in a previous thread (https://breachforums.hn/Thread-Ransomwar...n-Internet) had a second stage powershell script that I've reorganized and commented (noob-friendly). Enjoy!

For real let me see, let me see, side bro let me go first?
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  M-Benz Source Code LEAK !!! malibu 4 897 03-17-2025, 01:45 PM
Last Post: NoBreach
  Looking for a CraxPro Forum Invitation Code CacaTornado17 0 273 03-05-2025, 04:46 PM
Last Post: CacaTornado17
  Python code? Ag0stin0 10 556 02-28-2025, 02:32 PM
Last Post: Ag0stin0
  Riot src code leak suvd12 0 412 11-06-2024, 11:19 PM
Last Post: suvd12
  All leaked databases in one link? ELIT3E 7 545 09-23-2024, 03:13 PM
Last Post: Reporter

Forum Jump:


 Users browsing this thread: 1 Guest(s)