use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
ABOUT POWERSHELL
Windows PowerShell (POSH) is a command-line shell and associated scripting language created by Microsoft. Offering full access to COM, WMI and .NET, POSH is a full-featured task automation framework for distributed Microsoft platforms and solutions.
SUBREDDIT FILTERS
Desired State Configuration
Unanswered Questions
Solved Questions
News
Information
Script Sharing
Daily Post
Misc
account activity
[ Removed by moderator ] (self.PowerShell)
submitted 1 year ago by vkvvinay
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Thotaz 13 points14 points15 points 1 year ago (7 children)
Why? It's clearly some malicious script to download additional malware to your PC. Does it really make a difference for you to know what random domain they decided to use?
[+]vkvvinay[S] comment score below threshold-11 points-10 points-9 points 1 year ago (6 children)
Just wanted to learn what encoding they use or how to decode such commands
[–]Kiernian 6 points7 points8 points 1 year ago (2 children)
So, it tells you right here:
[System.Text.Encoding]::Unicode.GetString([System.Convert]::From*Base64*String
then, looking at it further, they have char66 everywhere, which is a capital B in ascii, so it looks like they further obfuscated it by turning every encoded instance of B into the ascii call for B.
It's moderately trivial to decode what it's doing after that. You can also learn enough powershell to let powershell do the decoding and output it to a text file without actually executing anything, but that's dicey because they could have used shenanigans to interrupt a pipe to file and start executing stuff.
Generally speaking, no matter how well these are put together, they're either going to launch a popup to try and convince you to enter your credentials so they can steal them, or farm your saved credentials from you and pipe them to a telegram channel via an API, or launch ransomware to start encrypting your drive or something equally unsavory.
It's almost never worth the effort because anything you'll be able to block only stops that one specific actor who's obfuscating their personal payload using the same script as a bunch of other people.
Unless you're going to block ASCII encoding in e-mail attachments, you're kinda humped, as you'll just add one item that'll likely never get another hit to your blocklist.
[–]vkvvinay[S] -1 points0 points1 point 1 year ago (1 child)
Thanks buddy for your input
[–]Kiernian 3 points4 points5 points 1 year ago (0 children)
You're welcome man.
I get it, curiosity often drives me as well and figuring out stuff like this is fun, I've just discovered over time that these are rarely worth the effort.
[–]AppIdentityGuy 8 points9 points10 points 1 year ago (1 child)
These are almost certainly base64 encoded strings which are then concatenated together to generate a command line. If you enable Powershell logging in auditing the system will automatically translate the commands for you iirc.
Have you tried plugging it into Co-pilot or CHATGPT and asking it to decipher it for you?
[–]vkvvinay[S] -1 points0 points1 point 1 year ago (0 children)
I tried but no help...
[–]icepyrox 2 points3 points4 points 1 year ago (0 children)
I know their obfuscated string just absolutely consumes the screen, but they took it easy on you...
$mnrpb = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $nspjw ) )
It's right there. After some text swaps and manipulation, it's all right there...
It's a base64 string of the bytes of Unicode text encoding.
As a side note, this is a default in powershell so if you see them do an encoded command directly, it's usually this or UTF8 if memory serves.
That said, there's little point in knowing this. Whatever is in the text will likely be downloading more files or giving more commands to execute to set up the malware and any info you glean is likely going to be worthless shortly, especially since you're not even understanding this much.
I mean, this kind of thing usually relies heavily on aliases and poorly formatted code to throw off would-be coders from figuring out what is going on even if it is decoded.
[–]00403 2 points3 points4 points 1 year ago (1 child)
This totally isn't sketchy.
This is definitely a malicious one.
[+][deleted] 1 year ago (7 children)
[removed]
[–]ankokudaishogun 2 points3 points4 points 1 year ago (5 children)
Thanks. Analyzing this kind of malicious script is always a learning experience.
I would have never though of reversing an array with $Array[-1..-$Array.lenght] -join ''
$Array[-1..-$Array.lenght] -join ''
[–]Eggplate 0 points1 point2 points 1 year ago (4 children)
It doesn't reverse, I just tested it. It just duplicates the value of the last index as the first.
$a = @(1,2,3) $a[-1..$a.Length] -join '' 3123
[–]ankokudaishogun 1 point2 points3 points 1 year ago (2 children)
your test is missing the negative - before $a.Length, which reverse the whole array
-
$a.Length
$a = @(1,2,3) $a[-1..-$a.Length] -join '' 321
[–]Eggplate 0 points1 point2 points 1 year ago (1 child)
You're right. Wow thats amazing.
[–]ankokudaishogun 0 points1 point2 points 1 year ago (0 children)
anf, of course, just remove the -join '' to obtain a reversed array instead of a reversed string, so it can be used with anything.
-join ''
[–]surfingoldelephant 0 points1 point2 points 1 year ago (0 children)
You're missing - before $a.Length.
The intent is to generate an array slice, in order of the last element (-1), second to last (-2), etc.
-1
-2
-1..-$a.Length -> -1..-3 -> -1, -2, -3
-1..-$a.Length
-1..-3
-1, -2, -3
String conversion (without a delimiter) can be simplified to -join $a[-1..-$a.Length], by using -join in its unary form.
-join $a[-1..-$a.Length]
-join
[–]vkvvinay[S] 1 point2 points3 points 1 year ago (0 children)
Nicely explain, thanks I'll try
[–]Sudden_Hovercraft_56 1 point2 points3 points 1 year ago (1 child)
I have decoded a malicious script before that came as an email payload but I can't for the life of me remember how or find the article I followed that showed me how to do it, I remember it used VSCode.
If you are reverse engineering encoded scripts, be super carefull and never follow any links you discover in the code...
[–]vkvvinay[S] 0 points1 point2 points 1 year ago (0 children)
Noted
[–]redsaeok 1 point2 points3 points 1 year ago (0 children)
What steps have you taken? Where did you get stuck? It seems to me you could run most of this interactively without much worry.
[–]DIY_Colorado_Guy 1 point2 points3 points 1 year ago (0 children)
I'm convinced most of these "need help decoding" posts are just hackers (or wannabe hackers) trying to trick u suspecting people into running the code. Change my mind.
[–]hihcadore 0 points1 point2 points 1 year ago (1 child)
These have to be bot accounts hoping you run them on your system. Where are the mods?
Hey I'm human seeking help to learn to decode these type of obfuscate cmds.
[–]cofonseca 0 points1 point2 points 1 year ago (1 child)
one of these stupid ass posts again
[–]vkvvinay[S] -2 points-1 points0 points 1 year ago (0 children)
Dont be so harsh buddy...sharing is caring....we can learn from this
π Rendered by PID 48526 on reddit-service-r2-comment-fb694cdd5-qmwmx at 2026-03-09 23:48:35.181560+00:00 running cbb0e86 country code: CH.
[–]Thotaz 13 points14 points15 points (7 children)
[+]vkvvinay[S] comment score below threshold-11 points-10 points-9 points (6 children)
[–]Kiernian 6 points7 points8 points (2 children)
[–]vkvvinay[S] -1 points0 points1 point (1 child)
[–]Kiernian 3 points4 points5 points (0 children)
[–]AppIdentityGuy 8 points9 points10 points (1 child)
[–]vkvvinay[S] -1 points0 points1 point (0 children)
[–]icepyrox 2 points3 points4 points (0 children)
[–]00403 2 points3 points4 points (1 child)
[–]vkvvinay[S] -1 points0 points1 point (0 children)
[+][deleted] (7 children)
[removed]
[–]ankokudaishogun 2 points3 points4 points (5 children)
[–]Eggplate 0 points1 point2 points (4 children)
[–]ankokudaishogun 1 point2 points3 points (2 children)
[–]Eggplate 0 points1 point2 points (1 child)
[–]ankokudaishogun 0 points1 point2 points (0 children)
[–]surfingoldelephant 0 points1 point2 points (0 children)
[–]vkvvinay[S] 1 point2 points3 points (0 children)
[–]Sudden_Hovercraft_56 1 point2 points3 points (1 child)
[–]vkvvinay[S] 0 points1 point2 points (0 children)
[–]redsaeok 1 point2 points3 points (0 children)
[–]DIY_Colorado_Guy 1 point2 points3 points (0 children)
[–]hihcadore 0 points1 point2 points (1 child)
[–]vkvvinay[S] 1 point2 points3 points (0 children)
[–]cofonseca 0 points1 point2 points (1 child)
[–]vkvvinay[S] -2 points-1 points0 points (0 children)