Technical Information
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'COM Surrogate' = '"%APPDATA%\Windows\dllhost.exe"'
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'COM Surrogate' = '"<Full path to file>"'
- '<SYSTEM32>\schtasks.exe' /create /tn "COM Surrogate" /sc ONLOGON /tr "%APPDATA%\Windows\dllhost.exe" /rl HIGHEST /f
- '%APPDATA%\Windows\dllhost.exe'
- '<SYSTEM32>\schtasks.exe' /create /tn "COM Surrogate" /sc ONLOGON /tr "<Full path to file>" /rl HIGHEST /f
- %APPDATA%\Windows logs\04-18-2017
- %APPDATA%\Windows\dllhost.exe
- %APPDATA%\Windows\dllhost.exe
- 'ap#.#pify.org':80
- 'mi####.duckdns.org':1213
- 'ip##pi.com':80
- 'fr###eoip.net':80
- http://ap#.#pify.org/
- http://fr###eoip.net/xml/
- http://ip##pi.com/json/
- DNS ASK ap#.#pify.org
- DNS ASK mi####.duckdns.org
- DNS ASK ip##pi.com
- DNS ASK fr###eoip.net