Техническая информация
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'GoogleMoney' = '%APPDATA%\GBTC\GMoney.exe'
- %APPDATA%\winsrvc.exe -t 6 -o http://mi####.eligius.st:8337 -u 17EzqSKFoFWXMJ6qjwDShpAM2mTmTycX7i -p x
- %APPDATA%\GBTC\GMoney.exe
- %APPDATA%\winsrvc.exe (загружен из сети Интернет)
- <SYSTEM32>\winlogon.exe
- <SYSTEM32>\reg.exe ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "GoogleMoney" /t REG_SZ /d "%APPDATA%\GBTC\GMoney.exe" /f
- <SYSTEM32>\cmd.exe /c ""%TEMP%\PCOWN.bat" "
- %HOMEPATH%\Local Settings\Temporary Internet Files\Content.IE5\KHMHGZ4F\System32[1].txt
- %APPDATA%\winsrvc.exe
- %APPDATA%\GBTC\GMoney.exe
- %TEMP%\PCOWN.txt
- %TEMP%\PCOWN.bat
- %APPDATA%\GBTC\GMoney.exe
- <Полный путь к вирусу>
- %TEMP%\PCOWN.bat
- %TEMP%\PCOWN.txt
- 'bo####nminer.com':80
- 'localhost':1035
- bo####nminer.com/MX/UF/xxx/System32.txt
- DNS ASK bo####nminer.com
- ClassName: 'Indicator' WindowName: ''