-
-
Save duaneking/3dd40d0921cc9cbe5a0f2057ca86b78b to your computer and use it in GitHub Desktop.
Revisions
-
Neo23x0 revised this gist
Feb 16, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -24,7 +24,7 @@ | `UEs` | 🏬 Upper East Side | `PK` | ZIP, Office documents | | `ey` | 🗣 Hey | `{ ` | Indicates JSON data | \* the `.` stands for `0x00` found in UTF-16 encoded text # Cyber Chef Recipe -
Neo23x0 revised this gist
Oct 15, 2020 . 1 changed file with 0 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,5 @@ # Learning Aid - Top Base64 Encodings Table | Base64 Code | Mnemonic Aid | Decoded* | Description | |-------------|--------------|----------|------------------------------------------| | `JAB` | 🗣 Jabber | `$.` | Variable declaration (UTF-16) | -
Neo23x0 revised this gist
Jul 8, 2020 . 1 changed file with 3 additions and 3 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -6,7 +6,6 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi |-------------|--------------|----------|------------------------------------------| | `JAB` | 🗣 Jabber | `$.` | Variable declaration (UTF-16) | | `TVq` | 📺 Television | `MZ` | MZ header | | `SUVY` | 🚙 SUV | `IEX` | PowerShell Invoke Expression | | `SQBFAF` | 🐣 Squab favorite | `I.E.` | PowerShell Invoke Expression (UTF-16) | | `SQBuAH` | 🐣 Squab uahhh | `I.n.` | PowerShell Invoke string (UTF-16) e.g. `Invoke-Mimikatz` | @@ -20,11 +19,12 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | `cmd` | As used in `cmd.exe /c wscript.exe` or the like | | `IAB` | 🥱 I am bored | ` s` | wide lower case `s`, often something like `sEt-iTem` | | `cABhAH` | 🕋 Kaaba | `p.a.` | wide formatted `param` | | `Qzpc` | 🖥 Quiz PC | `C:\` | Root of Windows partition (upper case) | | `Yzpc` | 🖥 Yes PC | `c:\` | Root of Windows partition (lower case) | | `UEs` | 🏬 Upper East Side | `PK` | ZIP, Office documents | | `ey` | 🗣 Hey | `{ ` | Indicates JSON data | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Jul 8, 2020 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -24,6 +24,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `Yzpc` | 🖥 Yes PC | `c:\` | Root of Windows partition (lower case) | | `ey` | 🗣 Hey | `{ ` | Indicates JSON data | | `IAB` | 🥱 I am bored | ` s` | wide lower case `s`, often something like `sEt-iTem` | | `cABhAH` | 🕋 Kaaba | `p.a.` | wide formatted `param` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Jan 25, 2020 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -12,7 +12,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `SQBuAH` | 🐣 Squab uahhh | `I.n.` | PowerShell Invoke string (UTF-16) e.g. `Invoke-Mimikatz` | | `PAA` | 💪 "Pah!" | `<.` | Often used by Emotet (UTF-16) | | `cwBhA` | 🦁 Chewbaka | `s.a.` | Often used in malicious droppers (UTF-16) 'sal' instead of 'var' | | `aWV4` | 😲 Awe version 4 | `iex` | PowerShell Invoke Expression | | `aQBlA` | 💦 Aqua Blah (aquaplaning) | `i.e.` | PowerShell Invoke Expression (UTF-16) | | `R2V0` | 🤖 R2D2 but version 0 | `Get` | Often used to obfuscate imports like GetCurrentThreadId | | `dmFy` | 👹 defy / demonify | `var` | Variable declaration | -
Neo23x0 revised this gist
Jan 25, 2020 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -9,6 +9,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `UEs` | 🏬 Upper East Side | `PK` | ZIP, Office documents | | `SUVY` | 🚙 SUV | `IEX` | PowerShell Invoke Expression | | `SQBFAF` | 🐣 Squab favorite | `I.E.` | PowerShell Invoke Expression (UTF-16) | | `SQBuAH` | 🐣 Squab uahhh | `I.n.` | PowerShell Invoke string (UTF-16) e.g. `Invoke-Mimikatz` | | `PAA` | 💪 "Pah!" | `<.` | Often used by Emotet (UTF-16) | | `cwBhA` | 🦁 Chewbaka | `s.a.` | Often used in malicious droppers (UTF-16) 'sal' instead of 'var' | | `aWV4` | Awe version 4 | `iex` | PowerShell Invoke Expression | -
Neo23x0 revised this gist
Jan 21, 2020 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -22,7 +22,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `Qzpc` | 🖥 Quiz PC | `C:\` | Root of Windows partition (upper case) | | `Yzpc` | 🖥 Yes PC | `c:\` | Root of Windows partition (lower case) | | `ey` | 🗣 Hey | `{ ` | Indicates JSON data | | `IAB` | 🥱 I am bored | ` s` | wide lower case `s`, often something like `sEt-iTem` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Jan 21, 2020 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -22,6 +22,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `Qzpc` | 🖥 Quiz PC | `C:\` | Root of Windows partition (upper case) | | `Yzpc` | 🖥 Yes PC | `c:\` | Root of Windows partition (lower case) | | `ey` | 🗣 Hey | `{ ` | Indicates JSON data | | `IAB` | 🥱 I am bored | ` s` | wide formatted lower case `s`, often something like `sEt-iTem` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 10, 2019 . 1 changed file with 3 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -19,8 +19,9 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | `cmd` | As used in `cmd.exe /c wscript.exe` or the like | | `Qzpc` | 🖥 Quiz PC | `C:\` | Root of Windows partition (upper case) | | `Yzpc` | 🖥 Yes PC | `c:\` | Root of Windows partition (lower case) | | `ey` | 🗣 Hey | `{ ` | Indicates JSON data | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 2, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -20,7 +20,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | `cmd` | As used in `cmd.exe /c wscript.exe` or the like | | `Qzpc` | 🖥 Quiz PC | `C:\` | Root of Windows partition (upper case)| | `Yzpc` | 🖥 Yes PC | `c:\` | Root of Windows partition (lower case)| \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 2, 2019 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -19,6 +19,8 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | `cmd` | As used in `cmd.exe /c wscript.exe` or the like | | `Qzpc` | 🖥 Quiz PC | `C:\` | Root of Windows partition (upper case)| | `Yzpc` | 🖥 Yes PC | `C:\` | Root of Windows partition (lower case)| \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 2, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -18,7 +18,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | `cmd` | As used in `cmd.exe /c wscript.exe` or the like | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 2, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -18,7 +18,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | cmd | As used in `cmd.exe /c wscript.exe` or the like | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 2, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -18,7 +18,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21k bug | cmd as in `cmd.exe /c wscript.exe` or the like | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Dec 2, 2019 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -18,6 +18,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | | `Y21k` | 🎆 Year 21-thousand bug | cmd as in `cmd.exe /c wscript.exe` or the like | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 11 additions and 11 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -4,20 +4,20 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | Base64 Code | Mnemonic Aid | Decoded* | Description | |-------------|--------------|----------|------------------------------------------| | `JAB` | 🗣 Jabber | `$.` | Variable declaration (UTF-16) | | `TVq` | 📺 Television | `MZ` | MZ header | | `UEs` | 🏬 Upper East Side | `PK` | ZIP, Office documents | | `SUVY` | 🚙 SUV | `IEX` | PowerShell Invoke Expression | | `SQBFAF` | 🐣 Squab favorite | `I.E.` | PowerShell Invoke Expression (UTF-16) | | `PAA` | 💪 "Pah!" | `<.` | Often used by Emotet (UTF-16) | | `cwBhA` | 🦁 Chewbaka | `s.a.` | Often used in malicious droppers (UTF-16) 'sal' instead of 'var' | | `aWV4` | Awe version 4 | `iex` | PowerShell Invoke Expression | | `aQBlA` | 💦 Aqua Blah (aquaplaning) | `i.e.` | PowerShell Invoke Expression (UTF-16) | | `R2V0` | 🤖 R2D2 but version 0 | `Get` | Often used to obfuscate imports like GetCurrentThreadId | | `dmFy` | 👹 defy / demonify | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | 🚁 HForce (Helicopter Force) I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . No changes.There are no files selected for viewing
-
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -17,7 +17,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4sIA` | HForce (Helicopter Force) 🚁 I agree | | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -17,7 +17,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4s` | Has | `\x1f\x8bv08\x00` | gzip magic bytes (0x1f8b), e.g. `echo 'test' \| gzip -cf \| base64` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . No changes.There are no files selected for viewing
-
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -17,7 +17,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4s` | Has | `\x1f\x8bv08\x00` | gzip magic bytes (0x1f8b), e.g. echo 'test' \| gzip -cf \| base64` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -17,7 +17,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4s` | Has | `\x1f\x8bv08\x00` | gzip magic bytes (0x1f8b), e.g. echo 'test' | gzip -cf | base64` | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -17,7 +17,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4s` | Has | `\x1f\x8bv08\x00` | gzip magic bytes (0x1f8b) | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 17 additions and 4 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -23,14 +23,27 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi # Cyber Chef Recipe https://gchq.github.io/CyberChef/#recipe=Fork('%5C%5Cn','%5C%5Cn',false)From_Base64('A-Za-z0-9%2B/%3D',true)&input=SkFCClRWcQpQQUEKU1VWWQpTUUJGQUYKYVdWNAphUUJsQQpSMlYwCmRtRnkKZGdCaEEKY3dCaEEKZFhOcGJtCkg0c0lBRldXc2wwQUF5dEpMUzdoQWdER05iazdCUUFBQUE9PQ # References # Tweet Tweet and Thread https://twitter.com/cyb3rops/status/1187341941794660354 ## JAB https://www.hybrid-analysis.com/sample/ce0415b6661ef66bbedb69896ad1ece9ee4e6dfde9925e9612aec7bbf1cb7bc5?environmentId=100 ## PAA Emotet process command line https://app.any.run/tasks/dfba6d53-7a93-4d8b-86ba-4e737ad06b06/ ## cwBha Explanation https://threat.tevora.com/5-minute-forensics-decoding-powershell-payloads/ Sample https://www.hybrid-analysis.com/sample/b744129bfe54de8b36d7556ddfcc55d0be213129041aacf52b7d2f57012caa60?environmentId=100 -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -17,6 +17,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | | `dgBhA` | debugger + high availability | `v.a.` | Variable declaration (UTF-16) | | `dXNpbm` | Dixon problem | `usin` | Often found in compile after delivery attacks | | `H4s` | Has | | gzip magic bytes (0x1f8b) | \* the `.` stands for `0x00` -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -2,8 +2,8 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encoding | Base64 Code | Mnemonic Aid | Decoded* | Description | |-------------|--------------|----------|------------------------------------------| | `JAB` | Jabber 🗣 | `$.` | Variable declaration (UTF-16) | | `TVq` | Television 📺 | `MZ` | MZ header | | `UEs` | Upper East Side 🏬 | `PK` | ZIP, Office documents | -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -11,7 +11,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encodi | `SQBFAF` | Squab 🐣 favorite | `I.E.` | PowerShell Invoke Expression (UTF-16) | | `PAA` | "Pah!" 💪 | `<.` | Often used by Emotet (UTF-16) | | `cwBhA` | Chewbaka 🦁 | `s.a.` | Often used in malicious droppers (UTF-16) 'sal' instead of 'var' | | `aWV4` | Awe version 4 | `iex` | PowerShell Invoke Expression | | `aQBlA` | Aqua Blah (aquaplaning) 💦 | `i.e.` | PowerShell Invoke Expression (UTF-16) | | `R2V0` | R2D2 🤖 but version 0 | `Get` | Often used to obfuscate imports like GetCurrentThreadId | | `dmFy` | defy / demonify 👹 | `var` | Variable declaration | -
Neo23x0 revised this gist
Oct 25, 2019 . No changes.There are no files selected for viewing
-
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,7 +3,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encoding | Base64 Code | Mnemonic | Decoded* | Description | |-------------|----------|----------|------------------------------------------| | `JAB` | Jabber 🗣 | `$.` | Variable declaration (UTF-16) | | `TVq` | Television 📺 | `MZ` | MZ header | | `UEs` | Upper East Side 🏬 | `PK` | ZIP, Office documents | -
Neo23x0 revised this gist
Oct 25, 2019 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -3,7 +3,7 @@ MITRE ATT4CK - [T1132](https://attack.mitre.org/techniques/T1132/) - Data Encoding | Base64 Code | Mnemonic | Decoded* | Description | |-------------|---------------------------------|----------|-------------------| | `JAB` | Jabber 🗣 | `$.` | Variable declaration (UTF-16) | | `TVq` | Television 📺 | `MZ` | MZ header | | `UEs` | Upper East Side 🏬 | `PK` | ZIP, Office documents |
NewerOlder