Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'WindowssServicss' = '%APPDATA%\WindowsServicess\Loader.exe'
- '%APPDATA%\WindowsServicess\Taskhost.exe' -a scrypt -g no -o stratum+tcp://eu.ltcrabbit.com:3333 -u blackshadow.1 -p x -t 8
- '%APPDATA%\WindowsServicess\Taskhost.exe' (загружен из сети Интернет)
- '<SYSTEM32>\attrib.exe' -s -h %APPDATA%\WindowsServicess
- %APPDATA%\WindowsServicess\openssl.dll
- %APPDATA%\WindowsServicess\phatk.cl
- %APPDATA%\WindowsServicess\usft_ext.dll
- %APPDATA%\WindowsServicess\mpir.dll
- %APPDATA%\WindowsServicess\Taskhost.exe
- %APPDATA%\WindowsServicess\coinutil.dll
- %APPDATA%\WindowsServicess\miner.dll
- из <Полный путь к вирусу> в %APPDATA%\WindowsServicess\Loader.exe
- '19#.#0.57.179':80
- 'wp#d':80
- 19#.#0.57.179/sov_9292/openssl.dll
- 19#.#0.57.179/sov_9292/mpir.dll
- 19#.#0.57.179/sov_9292/usft_ext.dll
- 19#.#0.57.179/sov_9292/phatk.cl
- 19#.#0.57.179/sov_9292/coin-miner.exe
- wp#d/wpad.dat
- 19#.#0.57.179/sov_9292/miner.dll
- 19#.#0.57.179/sov_9292/coinutil.dll
- DNS ASK wp#d
- ClassName: 'Indicator' WindowName: '(null)'