Техническая информация
- %HOMEPATH%\Start Menu\Programs\Startup\ebola.bmp
- %HOMEPATH%\Start Menu\Programs\Startup\<Имя вируса>.exe
- '<SYSTEM32>\cmd.exe' /c cleen.bat
- ClassName: 'PROCMON_WINDOW_CLASS' WindowName: ''
- ClassName: 'RegMonClass' WindowName: ''
- ClassName: 'FileMonClass' WindowName: ''
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\fcfe7c27b4e4723d451033fb6967d678_23ef5514-3059-436f-a4a7-4cefaab20eb1
- %APPDATA%\ebola.bmp
- <Текущая директория>\cleen.bat
- %ALLUSERSPROFILE%\Application Data\TEMP\RAIDTest
- %APPDATA%\Microsoft\Crypto\RSA\S-1-5-21-2052111302-484763869-725345543-1003\682d17b8eddcf3b7627a2a00e1160847_23ef5514-3059-436f-a4a7-4cefaab20eb1
- 'an####rusebola.com':80
- an####rusebola.com/a/script.php
- DNS ASK an####rusebola.com