Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- [<HKLM>\Software\Microsoft\Windows\CurrentVersion\Run] '5cd8f17f4086744065eb0992a09e05a2' = '"%TEMP%\Trojan.exe" ..'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\Trojan.exe" "Trojan.exe" ENABLE
- %PROGRAMDATA%\file.vbs
- %PROGRAMDATA%\file.exe
- %TEMP%\trojan.exe
- %PROGRAMDATA%\file.vbs
- 'ta###.publicvm.com':777
- DNS ASK ta###.publicvm.com
- '<SYSTEM32>\wscript.exe' "%PROGRAMDATA%\file.vbs"
- '%PROGRAMDATA%\file.exe'
- '%TEMP%\trojan.exe'
- '<SYSTEM32>\netsh.exe' firewall add allowedprogram "%TEMP%\Trojan.exe" "Trojan.exe" ENABLE' (with hidden window)
- '<SYSTEM32>\cmd.exe' /k ping 0 & del "<Full path to file>" & exit' (with hidden window)
- '<SYSTEM32>\cmd.exe' /k ping 0 & del "<Full path to file>" & exit
- '<SYSTEM32>\ping.exe' 0