<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>PsExec on bubka hacks stuff</title><link>https://hexpysya.github.io/tags/psexec/</link><description>Recent content in PsExec on bubka hacks stuff</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Mon, 13 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://hexpysya.github.io/tags/psexec/index.xml" rel="self" type="application/rss+xml"/><item><title>ELK-BumbleBee - GOLD CABIN</title><link>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</link><pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/elk-bumblebee---gold-cabin/</guid><description>An employee at CompliantSecure received a phishing email from emkei.cz, downloaded a malicious ISO containing BumbleBee loader 23.dll, which established C2 to 3.68.97.124 and injected into ImagingDevices.exe, dumped LSASS credentials, laterally moved to DC01 via PsExec using markw credentials, staged AdFind and AnyDesk, created sql_admin backdoor account, moved to FileServer01 and Support01, exfiltrated archived share data, and deployed Conti ransomware dropping R3ADM3.txt ransom notes.</description></item><item><title>Splunk-GoldenSpray</title><link>https://hexpysya.github.io/blue_team/splunk-goldenspray/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/splunk-goldenspray/</guid><description>An attacker from 77.91.78.115 brute-forced mwilliams credentials, connected via RDP, dropped OfficeUpdater.exe with registry persistence, staged Backup_Tools including mimikatz, dumped lsass to obtain jsmith credentials, laterally moved to ST-DC01 and ST-FS01, established scheduled task persistence on the DC, and archived client data for exfiltration.</description></item><item><title>ELK-Black Basta</title><link>https://hexpysya.github.io/blue_team/elk-black-basta/</link><pubDate>Thu, 09 Apr 2026 00:00:00 +0000</pubDate><guid>https://hexpysya.github.io/blue_team/elk-black-basta/</guid><description>A finance employee opened a malicious Excel macro from a drive-by download, which executed a VBS dropper, loaded WindowsUpdaterFX.dll via regsvr32, established persistence, dropped Pancake.jpg.exe as a C2 backdoor, performed internal reconnaissance, laterally moved to a domain controller via PsExec using compromised credentials, exfiltrated client data to MEGA via rclone, deleted shadow copies, and deployed BlackBasta ransomware.</description></item></channel></rss>