Analysis Date2015-07-30 11:15:21
MD56cf330eb966c6c7491f82380cba18bdd
SHA112b3fdcba773d778b3fcc557e97dba6405a862af

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 8ab4e3832e925aafe4f372abfb326b44 sha1: 47e4e902789ce5961414c618bea7876155a92647 size: 155136
Section.rdata md5: 70f43ca36d3972b5e8f50304ca7911b0 sha1: c52ec00303d1bc60593e6c7bd5fde75cc448d410 size: 38400
Section.data md5: 0b5b49fa4d319626c72af6eb97f435df sha1: de46bb150edf8909f24a3ca4da0e52c1b8f31b08 size: 7168
Timestamp2015-03-13 09:11:43
PackerMicrosoft Visual C++ ?.?
PEhash925c3cae40a36486f9b0832e476a971d41b9bcb2
IMPhashe921a65fc9b7860831fbf9ef211d9384
AVF-SecureGen:Variant.Rodecap.1
AVAvira (antivir)TR/Spy.ZBot.xbbeoiq
AVClamAVno_virus
AVEmsisoftGen:Variant.Rodecap.1
AVEset (nod32)Win32/Rodecap.BJ
AVRisingno_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.Y
AVCAT (quickheal)Trojan.Scar.r3
AVPadvishno_virus
AVKasperskyTrojan.Win32.Generic
AVAd-AwareGen:Variant.Rodecap.1
AVMcafeeTrojan-FEVX!6CF330EB966C
AVBullGuardGen:Variant.Rodecap.1
AVFrisk (f-prot)no_virus
AVMalwareBytesTrojan.Agent
AVDr. WebTrojan.DownLoader13.13228
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVVirusBlokAda (vba32)Trojan.Scar
AVFortinetW32/Rodecap.BJ!tr
AVCA (E-Trust Ino)no_virus
AVTrend Microno_virus
AVBitDefenderGen:Variant.Rodecap.1
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVIkarusTrojan.Win32.Rodecap
AVK7no_virus
AVAlwil (avast)Kryptik-PDK [Trj]
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVGrisoft (avg)Win32/Cryptor
AVTwisterTrojan.Scar.iyes.fkks
AVSymantecDownloader.Upatre!g15
AVZillya!Trojan.Scar.Win32.88823

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\jruqfoaws\b5z2gjhh
Creates FileC:\jruqfoaws\lb4vp1mm8quigzmivla.exe
Creates FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Deletes FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Creates ProcessC:\jruqfoaws\lb4vp1mm8quigzmivla.exe

Process
↳ C:\jruqfoaws\lb4vp1mm8quigzmivla.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Device Filtering Extensible Center Internet ➝
C:\jruqfoaws\lzlhbxyv.exe
Creates FileC:\jruqfoaws\b5z2gjhh
Creates FileC:\jruqfoaws\lzlhbxyv.exe
Creates FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Creates FileC:\jruqfoaws\kq5o8fh61
Deletes FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Creates ProcessC:\jruqfoaws\lzlhbxyv.exe
Creates ServiceDCOM Performance Fax - C:\jruqfoaws\lzlhbxyv.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1864

Process
↳ Pid 1172

Process
↳ C:\jruqfoaws\lzlhbxyv.exe

Creates FileC:\jruqfoaws\inuunngbun
Creates Filepipe\net\NtControlPipe10
Creates FileC:\jruqfoaws\b5z2gjhh
Creates File\Device\Afd\Endpoint
Creates FileC:\jruqfoaws\pcaceln.exe
Creates FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Creates FileC:\jruqfoaws\kq5o8fh61
Deletes FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Creates Processrpggv1cf6i0t "c:\jruqfoaws\lzlhbxyv.exe"

Process
↳ C:\jruqfoaws\lzlhbxyv.exe

Creates FileC:\jruqfoaws\b5z2gjhh
Creates FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Deletes FileC:\WINDOWS\jruqfoaws\b5z2gjhh

Process
↳ rpggv1cf6i0t "c:\jruqfoaws\lzlhbxyv.exe"

Creates FileC:\jruqfoaws\b5z2gjhh
Creates FileC:\WINDOWS\jruqfoaws\b5z2gjhh
Deletes FileC:\WINDOWS\jruqfoaws\b5z2gjhh

Network Details:

DNSwaterpeople.net
Type: A
66.151.181.49
DNSpartyready.net
Type: A
8.5.1.51
DNSpartypeople.net
Type: A
217.138.13.211
DNSalreadycondition.net
Type: A
95.211.230.75
DNScrowdnation.net
Type: A
107.161.23.204
DNScrowdnation.net
Type: A
142.4.203.239
DNScrowdnation.net
Type: A
107.191.99.114
DNSwaterplease.net
Type: A
182.162.94.49
DNSwatercondition.net
Type: A
204.11.56.25
DNSwomannation.net
Type: A
50.63.202.46
DNSsmokecondition.net
Type: A
208.91.197.241
DNSpartynation.net
Type: A
72.52.4.91
DNSpartyplease.net
Type: A
209.157.71.176
DNSthoughtpeople.net
Type: A
DNSthoughtdaughter.net
Type: A
DNSwaterdaughter.net
Type: A
DNSwomanready.net
Type: A
DNSsmokeready.net
Type: A
DNSwomanbrown.net
Type: A
DNSsmokebrown.net
Type: A
DNSwomanpeople.net
Type: A
DNSsmokepeople.net
Type: A
DNSwomandaughter.net
Type: A
DNSsmokedaughter.net
Type: A
DNSfightready.net
Type: A
DNSpartybrown.net
Type: A
DNSfightbrown.net
Type: A
DNSfightpeople.net
Type: A
DNSpartydaughter.net
Type: A
DNSfightdaughter.net
Type: A
DNSfreshnation.net
Type: A
DNSexperiencenation.net
Type: A
DNSfreshsoldier.net
Type: A
DNSexperiencesoldier.net
Type: A
DNSfreshplease.net
Type: A
DNSexperienceplease.net
Type: A
DNSfreshcondition.net
Type: A
DNSexperiencecondition.net
Type: A
DNSgentlemannation.net
Type: A
DNSalreadynation.net
Type: A
DNSgentlemansoldier.net
Type: A
DNSalreadysoldier.net
Type: A
DNSgentlemanplease.net
Type: A
DNSalreadyplease.net
Type: A
DNSgentlemancondition.net
Type: A
DNSfollownation.net
Type: A
DNSmembernation.net
Type: A
DNSfollowsoldier.net
Type: A
DNSmembersoldier.net
Type: A
DNSfollowplease.net
Type: A
DNSmemberplease.net
Type: A
DNSfollowcondition.net
Type: A
DNSmembercondition.net
Type: A
DNSbeginnation.net
Type: A
DNSknownnation.net
Type: A
DNSbeginsoldier.net
Type: A
DNSknownsoldier.net
Type: A
DNSbeginplease.net
Type: A
DNSknownplease.net
Type: A
DNSbegincondition.net
Type: A
DNSknowncondition.net
Type: A
DNSsummernation.net
Type: A
DNSsummersoldier.net
Type: A
DNScrowdsoldier.net
Type: A
DNSsummerplease.net
Type: A
DNScrowdplease.net
Type: A
DNSsummercondition.net
Type: A
DNScrowdcondition.net
Type: A
DNSthoughtnation.net
Type: A
DNSwaternation.net
Type: A
DNSthoughtsoldier.net
Type: A
DNSwatersoldier.net
Type: A
DNSthoughtplease.net
Type: A
DNSthoughtcondition.net
Type: A
DNSsmokenation.net
Type: A
DNSwomansoldier.net
Type: A
DNSsmokesoldier.net
Type: A
DNSwomanplease.net
Type: A
DNSsmokeplease.net
Type: A
DNSwomancondition.net
Type: A
DNSfightnation.net
Type: A
DNSpartysoldier.net
Type: A
DNSfightsoldier.net
Type: A
DNSfightplease.net
Type: A
DNSpartycondition.net
Type: A
DNSfightcondition.net
Type: A
DNSfreshcentury.net
Type: A
HTTP GEThttp://waterpeople.net/index.php?method&len
User-Agent:
HTTP GEThttp://partyready.net/index.php?method&len
User-Agent:
HTTP GEThttp://partypeople.net/index.php?method&len
User-Agent:
HTTP GEThttp://alreadycondition.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdnation.net/index.php?method&len
User-Agent:
HTTP GEThttp://waterplease.net/index.php?method&len
User-Agent:
HTTP GEThttp://watercondition.net/index.php?method&len
User-Agent:
HTTP GEThttp://womannation.net/index.php?method&len
User-Agent:
HTTP GEThttp://smokecondition.net/index.php?method&len
User-Agent:
HTTP GEThttp://partynation.net/index.php?method&len
User-Agent:
HTTP GEThttp://partyplease.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 66.151.181.49:80
Flows TCP192.168.1.1:1032 ➝ 8.5.1.51:80
Flows TCP192.168.1.1:1033 ➝ 217.138.13.211:80
Flows TCP192.168.1.1:1034 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1035 ➝ 107.161.23.204:80
Flows TCP192.168.1.1:1036 ➝ 182.162.94.49:80
Flows TCP192.168.1.1:1037 ➝ 204.11.56.25:80
Flows TCP192.168.1.1:1038 ➝ 50.63.202.46:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 72.52.4.91:80
Flows TCP192.168.1.1:1041 ➝ 209.157.71.176:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657270   se..Host: waterp
0x00000050 (00080)   656f706c 652e6e65 740d0a0d 0a         eople.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747972   se..Host: partyr
0x00000050 (00080)   65616479 2e6e6574 0d0a0d0a 0a         eady.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747970   se..Host: partyp
0x00000050 (00080)   656f706c 652e6e65 740d0a0d 0a         eople.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20616c 72656164   se..Host: alread
0x00000050 (00080)   79636f6e 64697469 6f6e2e6e 65740d0a   ycondition.net..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f77646e   se..Host: crowdn
0x00000050 (00080)   6174696f 6e2e6e65 740d0a0d 0a740d0a   ation.net....t..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657270   se..Host: waterp
0x00000050 (00080)   6c656173 652e6e65 740d0a0d 0a740d0a   lease.net....t..
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657263   se..Host: waterc
0x00000050 (00080)   6f6e6469 74696f6e 2e6e6574 0d0a0d0a   ondition.net....
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20776f 6d616e6e   se..Host: womann
0x00000050 (00080)   6174696f 6e2e6e65 740d0a0d 0a0a0d0a   ation.net.......
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a20736d 6f6b6563   se..Host: smokec
0x00000050 (00080)   6f6e6469 74696f6e 2e6e6574 0d0a0d0a   ondition.net....
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 7274796e   se..Host: partyn
0x00000050 (00080)   6174696f 6e2e6e65 740d0a0d 0a0a0d0a   ation.net.......
0x00000060 (00096)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207061 72747970   se..Host: partyp
0x00000050 (00080)   6c656173 652e6e65 740d0a0d 0a         lease.net....


Strings