Техническая информация
- %HOMEPATH%\Start Menu\Programs\Startup\ebola.bmp
- %HOMEPATH%\Start Menu\Programs\Startup\<Имя вируса>.exe
- '<SYSTEM32>\cmd.exe' /c cleen.bat
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: 'RegMonClass' WindowName: ''
- ClassName: 'FileMonClass' WindowName: ''
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\946fb3a72abd8409b5e937aea59a119c_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\549b9b645cadfe6bb4bc69cf363c354c_23ef5514-3059-436f-a4a7-4cefaab20eb1
- <Текущая директория>\cleen.bat
- %APPDATA%\ebola.bmp
- %ALLUSERSPROFILE%\Application Data\TEMP:CBE9DC06
- %ALLUSERSPROFILE%\Application Data\TEMP\RAIDTest
- %ALLUSERSPROFILE%\Application Data\Licenses\00B49F09E5693CC74.Lic
- 'an####rusebola.com':80
- an####rusebola.com/a/script.php
- DNS ASK an####rusebola.com