Техническая информация
- [<HKLM>\System\CurrentControlSet\Services\RpcRtRemote] 'Start' = '00000002'
- [<HKLM>\System\CurrentControlSet\Services\RpcRtRemote] 'ImagePath' = '"%WINDIR%\SysWOW64\rastls\RpcRtRemote.exe"'
- 'RpcRtRemote' "%WINDIR%\SysWOW64\rastls\RpcRtRemote.exe"
- 'RpcRtRemote' %WINDIR%\SysWOW64\rastls\RpcRtRemote.exe
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD IABzAGUAVAAtAEkAVABlAE0AIAAgAHYAYQBSAGkAYQBiAEwAZQA6AHcAZwBOADkAIAAgACgAWwB0AHkAcABFAF0AKAAiAHsAMwB9AHsAMgB9AHsAMQB9AHsAMAB9ACIALQBGACAAJwBSAFkAJwAsACcARABpAHIARQBDAHQAbw...
- %HOMEPATH%\hyarty_\nm_cy55\xr0ryl.exe
- %WINDIR%\syswow64\rastls\rpcrtremote.exe
- %HOMEPATH%\hyarty_\nm_cy55\xr0ryl.exe в %WINDIR%\syswow64\rastls\rpcrtremote.exe
- '24.##8.90.49':80
- '96.##6.101.6':8080
- http://24.##8.90.49/9Oj3T5pXIRkg/r0Epl59P/Yxka3/
- http://96.###.101.6:8080/zrljFaz6WqIS/TjeNgeAUgh/lBmB6CEmw/ via 96.##6.101.6
- DNS ASK ra###emas.com
- '%HOMEPATH%\hyarty_\nm_cy55\xr0ryl.exe'
- '%WINDIR%\syswow64\rastls\rpcrtremote.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ENCOD IABzAGUAVAAtAEkAVABlAE0AIAAgAHYAYQBSAGkAYQBiAEwAZQA6AHcAZwBOADkAIAAgACgAWwB0AHkAcABFAF0AKAAiAHsAMwB9AHsAMgB9AHsAMQB9AHsAMAB9ACIALQBGACAAJwBSAFkAJwAsACcARABpAHIARQBDAHQAbw...' (со скрытым окном)