PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs)
As shown in my last blog , I took the time to analyze a very complicated, annoying and heavily obfuscated PowerShell that resulted in a payload that the LLM i was using as my intern indicated that it might be related to Red Team or Offensive Security course. This did not sit well with me and was even cemented more when one of my trusted friends also nudged me about the domains that dropped this PowerShell. Sooooo, this blog will be short but it is more to share the full picture and probably ask the community to see if they have seen these types of files and what could they be, are they associated with a certain campaign. The rabbit hole was deeeeeeep and with many tentacles here as the more i looked into it, the more it was complicated and cumbersome. Let us recap: 1- The initial PS script according to VT is being dropped from [random_sub_domain] .fd-api-iris-s-mn-com/.in/.net . 2- Once it is run, it goes through a multi layer of deobfuscation that we explained in the previous blog en...