by a bank ’ s security team , after detectingVulnerability-related.DiscoverVulnerabilityMeterpreter code inside the physical memory of a domain controller ( DC ) , ” the researchers explainedVulnerability-related.DiscoverVulnerability. “ Kaspersky Lab participated in the forensic analysis after this attack was detected , discoveringVulnerability-related.DiscoverVulnerabilitythe use of PowerShell scripts within the Windows registry . Additionally it was discoveredVulnerability-related.DiscoverVulnerabilitythat the NETSH utility as used for tunnelling traffic from the victim ’ s host to the attacker´s C2 ” . Meterpreter is a well known Metasploit payload that allows attackers to control the screen of a device using VNC and to browse , upload and download files . NETSH ( network shell ) , is a Windows command-line utility that allows local or remote configuration of network devices . The attackers also took advantage of the Windows SC utility to install a malicious service to execute PowerShell scripts , and Mimikatz to extract credentials from compromised machines .