Техническая информация
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] 'XXXXXXEB5143C5' = '%WINDIR%\XXXXXXEB5143C5\svchsot.exe'
- %WINDIR%\Tasks\At2.job
- %WINDIR%\Tasks\At1.job
- [<HKLM>\SYSTEM\ControlSet001\Services\Schedule] 'Start' = '00000002'
- <SYSTEM32>\at.exe 0:00 %WINDIR%\XXXXXXEB5143C5\svchsot.exe
- <SYSTEM32>\at.exe 1:00 %WINDIR%\XXXXXXEB5143C5\svchsot.exe
- <SYSTEM32>\at.exe 2:00 %WINDIR%\XXXXXXEB5143C5\svchsot.exe
- <SYSTEM32>\net1.exe start "Task Scheduler"
- <SYSTEM32>\cmd.exe /c %WINDIR%\XXXXXXEB5143C5\JH.BAT
- <SYSTEM32>\schtasks.exe /delete /tn * /f
- <SYSTEM32>\sc.exe config Schedule start= auto
- %WINDIR%\XXXXXXEB5143C5\JH.BAT
- из <Полный путь к вирусу> в %WINDIR%\XXXXXXEB5143C5\svchsot.exe
- 'localhost':8000
- '53####40.3322.org':8000
- DNS ASK 53####40.3322.org
- '<IP-адрес в локальной сети>':1036
- ClassName: '' WindowName: '??????????????'