Analysis Date | 2015-11-25 06:39:56 |
---|---|
MD5 | f4cd6413661a1d3e28b17a08cace3030 |
SHA1 | 21b21981c96e1b982f2ed2c8a5203d9a61988354 |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: e782a80bece6442a5b3c5c36d9e4fd48 sha1: e3aeb07e1857387aae84e37986bc81a4fc136ba3 size: 6144 | |
Section | .rdata md5: d64b4d064e0badbed877e4eeaa5f1044 sha1: ad09a3de3f2d62f629593d0a57ba8f5419bc5470 size: 3584 | |
Section | .data md5: ffa33e64cbbe24e8b83eb9cdc7b005a7 sha1: 709d0ee1f052802ad993961f8391d53e30499552 size: 2048 | |
Section | .rsrc md5: 46dbe90384adb2acacd1817f31e113c7 sha1: 72b1b0dc5877e805e8352baa39cba939ab237b35 size: 19968 | |
Timestamp | 2014-12-23 23:02:12 | |
Packer | Microsoft Visual C 2.0 | |
PEhash | 43eec24f8cac8b9a3a5592c521eb0160ce586b92 | |
IMPhash | 012c63bb5f7f1ff21471f621b5d79f47 | |
AV | F-Secure | Trojan.Downloader.JRTI |
AV | Authentium | W32/Dalexis.Q.gen!Eldorado |
AV | MalwareBytes | Trojan.Upatre |
AV | Dr. Web | Trojan.DownLoader13.28380 |
AV | Grisoft (avg) | Downloader.Generic14.VZM |
AV | MalwareBytes | Trojan.Upatre |
AV | Eset (nod32) | Win32/Kryptik.DIGI |
AV | MicroWorld (escan) | Trojan.Downloader.JRTI |
AV | Trend Micro | TROJ_UP.9EED1BD4 |
AV | ClamAV | no_virus |
AV | Ad-Aware | Trojan.Downloader.JRTI |
AV | Eset (nod32) | Win32/Kryptik.DIGI |
AV | BitDefender | Trojan.Downloader.JRTI |
AV | MicroWorld (escan) | Trojan.Downloader.JRTI |
AV | Avira (antivir) | TR/Crypt.ZPACK.160479 |
AV | Alwil (avast) | GenMalicious-KNL [Trj] |
AV | Fortinet | W32/Kryptic.ABGK!tr |
AV | Microsoft Security Essentials | TrojanDownloader:Win32/Upatre.G |
AV | Ikarus | Trojan.VB.Crypt |
AV | Kaspersky | Trojan-Downloader.Win32.Upatre.aetm |
AV | VirusBlokAda (vba32) | TrojanDownloader.Upatre |
AV | Arcabit (arcavir) | Trojan.Downloader.JRTI |
AV | Mcafee | Downloader-FASG!F4CD6413661A |
AV | Twister | TrojanDldr.Upatre.aetm.xuzy |
AV | Avira (antivir) | TR/Crypt.ZPACK.160479 |
AV | Alwil (avast) | GenMalicious-KNL [Trj] |
AV | Symantec | Downloader.Upatre!gen5 |
AV | Fortinet | W32/Kryptic.ABGK!tr |
AV | K7 | Trojan ( 004c29131 ) |
AV | Microsoft Security Essentials | TrojanDownloader:Win32/Upatre.G |
AV | Rising | Trojan.Win32.Kryptik.af |
AV | Mcafee | Downloader-FASG!F4CD6413661A |
AV | Twister | TrojanDldr.Upatre.aetm.xuzy |
AV | Ad-Aware | Trojan.Downloader.JRTI |
AV | Grisoft (avg) | Downloader.Generic14.VZM |
AV | Symantec | Downloader.Upatre!gen5 |
AV | BitDefender | Trojan.Downloader.JRTI |
AV | K7 | Trojan ( 004c29131 ) |
AV | Authentium | W32/Dalexis.Q.gen!Eldorado |
AV | Frisk (f-prot) | W32/Dalexis.Q.gen!Eldorado |
AV | Emsisoft | Trojan.Downloader.JRTI |
AV | Zillya! | no_virus |
AV | CAT (quickheal) | Trojan.Kadena.B4 |
AV | Padvish | no_virus |
AV | BullGuard | Trojan.Downloader.JRTI |
AV | CA (E-Trust Ino) | no_virus |
AV | Rising | Trojan.Win32.Kryptik.af |
AV | Ikarus | Trojan.VB.Crypt |
AV | Frisk (f-prot) | W32/Dalexis.Q.gen!Eldorado |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\Xulantar.exe |
---|---|
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\InstallXul.tmp |
Creates Process | C:\Documents and Settings\Administrator\Local Settings\Temp\Xulantar.exe |
Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\Xulantar.exe
Registry | HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝ NULL |
---|---|
Registry | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝ 1 |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm |
Creates File | C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat |
Creates File | C:\Documents and Settings\Administrator\Cookies\index.dat |
Creates File | PIPE\lsarpc |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat |
Deletes File | C:\malware.exe |
Creates Mutex | c:!documents and settings!administrator!local settings!history!history.ie5! |
Creates Mutex | WininetConnectionMutex |
Creates Mutex | c:!documents and settings!administrator!cookies! |
Creates Mutex | c:!documents and settings!administrator!local settings!temporary internet files!content.ie5! |
Winsock DNS | 91.211.17.201 |
Winsock DNS | 94.127.129.214 |
Winsock DNS | 89.203.144.101 |
Winsock DNS | 84.246.161.47 |
Winsock DNS | 87.249.142.189 |
Winsock DNS | 193.86.104.15 |
Winsock DNS | 81.90.175.7 |
Winsock DNS | 217.168.210.122 |
Winsock DNS | 89.203.194.212 |
Winsock DNS | icanhazip.com |
Network Details:
DNS | icanhazip.com Type: A 64.182.208.184 |
---|---|
DNS | icanhazip.com Type: A 64.182.208.185 |
HTTP GET | http://icanhazip.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0 |
HTTP GET | http://91.211.17.201:13392/KAT22/COMPUTER-XXXXXX/0/51-SP3/0/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0 |
Flows TCP | 192.168.1.1:1031 ➝ 64.182.208.184:80 |
Flows TCP | 192.168.1.1:1032 ➝ 91.211.17.201:13392 |
Flows TCP | 192.168.1.1:1033 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1034 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1035 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1036 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1037 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1038 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1039 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1040 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1041 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1042 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1043 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1044 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1045 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1046 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1047 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1048 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1049 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1050 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1051 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1052 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1053 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1054 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1055 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1056 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1057 ➝ 81.90.175.7:443 |
Flows TCP | 192.168.1.1:1058 ➝ 81.90.175.7:443 |
Flows TCP | 192.168.1.1:1059 ➝ 81.90.175.7:443 |
Flows TCP | 192.168.1.1:1060 ➝ 81.90.175.7:443 |
Raw Pcap
Strings
Button1 Button2 Dina-download ang Justefy... Nabigong i-download ang Justefy. Downloading Justefy... Ini-extract ang Justefy...)Dina-download ang nilalaman ng partner... Installer ng Justefy @jjj Justefy Kasalukuyang nag-i-installdHindi pa kumpletong nai-install ang Justefy. Sigurado ka bang gusto mong kanselahin ang pag-install? MessageBoxLabel msctls_progress32 MS Shell Dlg Nabigong i-extract ang Justefy. /> -(-,$ - )"*)- ,(-$*& ,$,)$&%, ,%-'($ !/.,&. /(*%-# /$&$,' '.%").(*)+./ '$*+(.-- (.$',,!,# $,$*.# */+$#"$/ *))*.(## +,*""$" &($""0' -*,&*#!!"+0 -+($0)/ !')`0@ $$#$%0 &,'0)!%""+("#,-% #"& #0+#*- .(. +)00 /&*.1.( '+ (1/$" ((! 1 1#&&13 ("(!2, $2-.-. _acmdln_dll </assembly> <assemblyIdentity <assemblyIdentity <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> []b;g, button Cancel _commode_dll CreateWindowExA CRTDLL.dll @.data d.)C~q DefWindowProcA </dependency> <dependency> </dependentAssembly> <dependentAssembly> <description>Justefy</description> DestroyWindow DialogBoxParamA DispatchMessageA EndDialog ExtractIconA _fmode_dll GetLastError GetLocalTime __GetMainArgs GetMessageA GetModuleFileNameA GetModuleHandleA GetStartupInfoA _global_unwind2 _initterm InterlockedDecrement InterlockedIncrement jdhXM@ KERNEL32.dll language="*" listbox LoadCursorA LoadIconA LoadLibraryA LoadStringA _local_unwind2 lstrcpyA <ms_asmv3:requestedExecutionLevel level="asInvoker" uiAccess="false" /> </ms_asmv3:requestedPrivileges> <ms_asmv3:requestedPrivileges> </ms_asmv3:security> <ms_asmv3:security> </ms_asmv3:trustInfo> <ms_asmv3:trustInfo xmlns:ms_asmv3="urn:schemas-microsoft-com:asm.v3"> NameFile: name="Justefy" name="Microsoft.Windows.Common-Controls" newfile ;")]nOO PathAddExtensionW PathGetDriveNumberW PathIsRelativeW PostMessageA PostQuitMessage p'RichW processorArchitecture="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" `.rdata RegisterClassExA riched32.dll richedit SendMessageA SetFocus SHELL32.dll SHLWAPI.dll SleepEx static STATIC !This program cannot be run in DOS mode. TranslateMessage type="win32" type="win32" u`H0pjI USER32.dll VC20XC00U version="1.0.0.0" version="6.0.0.0" WClass1 WindowA _XcptFilter <?xml version="1.0" encoding="UTF-8" standalone="yes"?>