Analysis Date | 2016-02-21 15:15:31 |
---|---|
MD5 | 4b8339a10d8f040acb8ebfdab6a439c7 |
SHA1 | 156ca357efd7b9e1c1eba1a3a85954a85b0d677f |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: bde5e957dadc83c34fc4c06da35388ae sha1: 4f74708b3cf94d2d090fad276cc84f5b2f6fa87e size: 531456 | |
Section | .rdata md5: 4b9c0c20e42c04373a4c62cc656bd6a1 sha1: 5d243b16ac8d1f304a3ad9e6597e78579bcd8791 size: 26112 | |
Section | .data md5: c87c6b4c52d405036b3cb6e428bcf402 sha1: 036a81dce03f22aaf47577e525bcc3922a0c0215 size: 20480 | |
Section | .reloc md5: 9646480717f015a44cc9f6cf77e3e32c sha1: 3657c879960d1c1d7c78f0c838855d3297c1d542 size: 39424 | |
Timestamp | 2014-03-23 07:37:49 | |
Packer | Microsoft Visual C++ 8 | |
PEhash | 618d8ee086f2bf9de8a15024dc000d5d0fcfb863 | |
IMPhash | f1f6f18ad7858f9b97325ccdfd3c3514 | |
AV | CA (E-Trust Ino) | Gen:Variant.Razy.13928 |
AV | Rising | No Virus |
AV | Mcafee | Trojan-FHSQ!4B8339A10D8F |
AV | Avira (antivir) | TR/Taranis.2137 |
AV | Twister | W32.Toolbar.CrossRider.AE.lfcr.mg |
AV | Ad-Aware | Gen:Variant.Razy.13928 |
AV | Alwil (avast) | Win32:Malware-gen |
AV | Eset (nod32) | Win32/Bayrob.BM |
AV | Grisoft (avg) | Generic37.AJMR |
AV | Symantec | No Virus |
AV | Fortinet | W32/Generic.FHSQ!tr |
AV | BitDefender | Gen:Variant.Razy.13928 |
AV | K7 | Trojan ( 004dc2a31 ) |
AV | Microsoft Security Essentials | TrojanSpy:Win32/Nivdort.DI |
AV | MicroWorld (escan) | Gen:Variant.Razy.13928 |
AV | MalwareBytes | No Virus |
AV | Authentium | W32/Nivdort.E.gen!Eldorado |
AV | Emsisoft | Gen:Variant.Razy.13928 |
AV | Frisk (f-prot) | W32/Nivdort.E.gen!Eldorado |
AV | Ikarus | Trojan.Bayrob |
AV | Zillya! | Trojan.Bayrob.Win32.13430 |
AV | Kaspersky | Trojan.Win32.Generic |
AV | Trend Micro | No Virus |
AV | VirusBlokAda (vba32) | No Virus |
AV | CAT (quickheal) | TrojanSpy.Nivdort.WR4 |
AV | BullGuard | Gen:Variant.Razy.13928 |
AV | Arcabit (arcavir) | Gen:Variant.Razy.13928 |
AV | ClamAV | No Virus |
AV | Dr. Web | No Virus |
AV | F-Secure | Gen:Variant.Razy.13928 |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\agqvwsazuwqrdvc\uq65o1mkis0onrfciwpg.exe |
---|---|
Creates File | C:\agqvwsazuwqrdvc\l3trhb2d |
Creates File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Deletes File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Creates Process | C:\agqvwsazuwqrdvc\uq65o1mkis0onrfciwpg.exe |
Process
↳ C:\agqvwsazuwqrdvc\uq65o1mkis0onrfciwpg.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Themes TCP/IP Level Office ➝ C:\agqvwsazuwqrdvc\qpdmfiantok.exe |
---|---|
Creates File | C:\agqvwsazuwqrdvc\qpdmfiantok.exe |
Creates File | PIPE\lsarpc |
Creates File | C:\agqvwsazuwqrdvc\uncfklt4fan |
Creates File | C:\agqvwsazuwqrdvc\l3trhb2d |
Creates File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Deletes File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Creates Process | C:\agqvwsazuwqrdvc\qpdmfiantok.exe |
Creates Service | Tunneling Accounts Endpoint PC Collector Fax - C:\agqvwsazuwqrdvc\qpdmfiantok.exe |
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ Pid 816
Process
↳ Pid 864
Process
↳ C:\WINDOWS\System32\svchost.exe
Process
↳ Pid 1220
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝ NULL |
---|---|
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝ 7 |
Registry | HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝ C:\WINDOWS\System32\spool\PRINTERS\\x00 |
Process
↳ Pid 1856
Process
↳ Pid 1148
Process
↳ C:\agqvwsazuwqrdvc\qpdmfiantok.exe
Creates File | C:\agqvwsazuwqrdvc\yrh5jabfpypz |
---|---|
Creates File | pipe\net\NtControlPipe10 |
Creates File | C:\agqvwsazuwqrdvc\myiwrtxcms.exe |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\agqvwsazuwqrdvc\uncfklt4fan |
Creates File | C:\agqvwsazuwqrdvc\l3trhb2d |
Creates File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Deletes File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Creates Process | ymfj3jr8hlrp "c:\agqvwsazuwqrdvc\qpdmfiantok.exe" |
Process
↳ C:\agqvwsazuwqrdvc\qpdmfiantok.exe
Creates File | C:\agqvwsazuwqrdvc\l3trhb2d |
---|---|
Creates File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Deletes File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Process
↳ ymfj3jr8hlrp "c:\agqvwsazuwqrdvc\qpdmfiantok.exe"
Creates File | C:\agqvwsazuwqrdvc\l3trhb2d |
---|---|
Creates File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Deletes File | C:\WINDOWS\agqvwsazuwqrdvc\l3trhb2d |
Network Details:
Raw Pcap
0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 6f63746f 72736368 6f6f6c2e 6e65740d octorschool.net. 0x00000050 (00080) 0a0d0a ... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 6f75626c 65746865 7265666f 72652e6e oubletherefore.n 0x00000050 (00080) 65740d0a 0d0a et.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2062 : close..Host: b 0x00000040 (00064) 726f6b65 6e717565 7374696f 6e2e6e65 rokenquestion.ne 0x00000050 (00080) 740d0a0d 0a0a t..... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746873 63686f6f 6c2e6e65 trengthschool.ne 0x00000050 (00080) 740d0a0d 0a0a t..... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a206d : close..Host: m 0x00000040 (00064) 6f76656d 656e7474 7261696e 696e672e ovementtraining. 0x00000050 (00080) 6e65740d 0a0d0a net.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2062 : close..Host: b 0x00000040 (00064) 75696c64 696e6773 746f726d 2e6e6574 uildingstorm.net 0x00000050 (00080) 0d0a0d0a 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 6f63746f 72747261 696e696e 672e6e65 octortraining.ne 0x00000050 (00080) 740d0a0d 0a0d0a t...... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 6f63746f 7273746f 726d2e6e 65740d0a octorstorm.net.. 0x00000050 (00080) 0d0a0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2072 : close..Host: r 0x00000040 (00064) 6573756c 7473746f 726d2e6e 65740d0a esultstorm.net.. 0x00000050 (00080) 0d0a0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2064 : close..Host: d 0x00000040 (00064) 65736972 6573746f 726d2e6e 65740d0a esirestorm.net.. 0x00000050 (00080) 0d0a0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746874 7261696e 696e672e trengthtraining. 0x00000050 (00080) 6e65740d 0a0d0a net.... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 7472656e 67746873 746f726d 2e6e6574 trengthstorm.net 0x00000050 (00080) 0d0a0d0a 0a0d0a ....... 0x00000000 (00000) 47455420 2f696e64 65782e70 68702048 GET /index.php H 0x00000010 (00016) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000020 (00032) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000030 (00048) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000040 (00064) 74696c6c 73746f72 6d2e6e65 740d0a0d tillstorm.net... 0x00000050 (00080) 0a0a0d0a 0a0d0a .......
Strings