Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Better yet - ChatGPT didn't actually decode the blob accurately.

It nails the URL, but manages somehow to get the temporary filename completely wrong (the actual filename is /tmp/pjKmMUFEYv8AlfKR, but ChatGPT says /tmp/lRghl71wClxAGs).

It's possible the screenshot is from a different payload, but I'm more inclined to believe that ChatGPT just squinted and made up a plausible /tmp/ filename.

In this case it doesn't matter what the filename is, but it's not hard to imagine a scenario where it did (e.g. it was a key to unlock the malware, an actually relevant filename, etc.).



Very common for these sorts of things to give different payloads to different user agents.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: