Техническая информация
- %HOMEPATH%\Start Menu\Programs\Startup\ebola.bmp
- %HOMEPATH%\Start Menu\Programs\Startup\<Имя вируса>.exe
- '<SYSTEM32>\cmd.exe' /c cleen.bat
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: 'RegMonClass' WindowName: ''
- ClassName: 'FileMonClass' WindowName: ''
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\c0528c2346cb928a9052304ef3ab8fd4_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\549b9b645cadfe6bb4bc69cf363c354c_23ef5514-3059-436f-a4a7-4cefaab20eb1
- <Текущая директория>\cleen.bat
- %APPDATA%\ebola.bmp
- %ALLUSERSPROFILE%\Application Data\TEMP:2289510C
- %ALLUSERSPROFILE%\Application Data\TEMP\RAIDTest
- %ALLUSERSPROFILE%\Application Data\Licenses\079CAB55B498425C5.Lic
- 'an####rusebola.com':80
- an####rusebola.com/a/script.php
- DNS ASK an####rusebola.com