A user downloaded an extension for a browser and the user's device later became infected. The analyst who is investigating the incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running:
New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume –
DriveLetter C – FileSystemLabel "New"-FileSystem NTFS – Full -Force –
Confirm:$false |
Which of the following is the malware using to execute the attack?
A. PowerShell
B. Python
C. Bash
D. Macros
New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume –
DriveLetter C – FileSystemLabel "New"-FileSystem NTFS – Full -Force –
Confirm:$false |
Which of the following is the malware using to execute the attack?
A. PowerShell
B. Python
C. Bash
D. Macros