A user downloaded an extension for a browser and the user’s device later became infected. The analyst who is investigating the incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running:
New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -DriveLetter C - FileSystemLabel "New"-FileSystem NTFS - Full -Force -Confirm:$false |
Which of the following is the malware using to execute the attack?
CS3000
Highly Voted 1 year, 10 months agoID77
1 year, 4 months agosujon_london
1 year, 9 months agoApplebeesWaiter1122
Highly Voted 1 year, 11 months agoSusAdmin
Most Recent 1 year, 6 months ago