Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'XRJUBN' = '"%APPDATA%\Windata\GKUKSI.exe"'
- %APPDATA%\microsoft\windows\start menu\programs\startup\xrjubn.lnk
- <SYSTEM32>\tasks\xrjubn.exe
- %TEMP%\autc805.tmp
- %TEMP%\fezink.exe
- %APPDATA%\windata\gkuksi.exe
- %TEMP%\autc805.tmp
- 'ha######hackers.ddns.net':27015
- DNS ASK ha######hackers.ddns.net
- '%TEMP%\fezink.exe'
- '%APPDATA%\windata\gkuksi.exe'
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /tn XRJUBN.exe /tr %APPDATA%\Windata\GKUKSI.exe /sc minute /mo 1' (with hidden window)
- '%APPDATA%\windata\gkuksi.exe' ' (with hidden window)
- '%WINDIR%\syswow64\cmd.exe' /c TITLE FEZINK.ini
- '%WINDIR%\syswow64\cmd.exe' /c schtasks /create /tn XRJUBN.exe /tr %APPDATA%\Windata\GKUKSI.exe /sc minute /mo 1
- '%WINDIR%\syswow64\schtasks.exe' /create /tn XRJUBN.exe /tr %APPDATA%\Windata\GKUKSI.exe /sc minute /mo 1
- '<SYSTEM32>\taskeng.exe' {24770DDD-15B2-4198-9263-E165D10222C3} S-1-5-21-1960123792-2022915161-3775307078-1001:bjdxuvmnybt\user:Interactive:[1]