Analysis Date2015-10-07 19:42:50
MD55d9d3404c010cd0f4fa31a7a908725d0
SHA128876e03d7c7723c8835710105fa5d0a710e6a27

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
SectionUPX0 md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
SectionUPX1 md5: 85357c8ef9a072d2d6067d2cbabd2050 sha1: 539b3b941a50f8277faae1b90189e702f18df7ff size: 21504
Section.rsrc md5: e997ba6e11b11cd324e93a079284be5d sha1: 64b9af09bb1f70e1137bd1bf1037c627e08a44c9 size: 2560
Timestamp2014-07-06 18:22:51
VersionLegalCopyright: (c) 2000-2014 Martin Prikryl
InternalName: winscp
FileVersion: 5.5.3.4214
CompanyName: Martin Prikryl
ReleaseType: stable
WWW: http://winscp.net/
ProductName: WinSCP
ProductVersion: 5.5.3.0
FileDescription: WinSCP: SFTP, FTP and SCP client
OriginalFilename: winscp.exe
PackerUPX -> www.upx.sourceforge.net
PEhash6fa98d17dbc21dd593e30f343c4e251faaebf51c
IMPhash06d92d662f64304b53228e40b8aadea8
AVRisingBackdoor.Overie!486D
AVMcafeeTrojan-FGAH!F2786695F02A
AVAvira (antivir)TR/Graftor.146258
AVTwisterTrojan.Cap1471811.wnmt
AVAd-AwareGeneric.ServStart.F274448E
AVAlwil (avast)Evo-gen [Susp]
AVEset (nod32)Win32/ServStart.D worm
AVGrisoft (avg)DoS.FEZ
AVSymantecBackdoor.Nitol
AVFortinetW32/ServStart.GL!tr
AVBitDefenderGeneric.ServStart.F274448E
AVK7Trojan-Downloader ( 0040f8ad1 )
AVMicrosoft Security EssentialsDDoS:Win32/Nitol.A
AVMicroWorld (escan)Generic.ServStart.F274448E
AVMalwareBytesTrojan.ServStart
AVAuthentiumW32/Heuristic-114!Eldorado
AVFrisk (f-prot)W32/Heuristic-114!Eldorado
AVIkarusTrojan.Win32.ServStart
AVEmsisoftGeneric.ServStart.F274448E
AVZillya!Worm.ServStart.Win32.60
AVKasperskyTrojan.Win32.Generic
AVTrend MicroTROJ_NITOL.SMN1
AVCAT (quickheal)no_virus
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGeneric.ServStart.F274448E
AVArcabit (arcavir)Generic.ServStart.F274448E
AVClamAVWin.Trojan.Dropped-1488
AVDr. WebTrojan.DownLoader11.21065
AVF-SecureGeneric.ServStart.F274448E
AVCA (E-Trust Ino)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Mnopqr ertet Def\Description ➝
Mnopqrst werwere Ghijklm Opqrstuv Xya
Creates FileC:\WINDOWS\nanvwo.exe
Creates ProcessC:\WINDOWS\system32\cmd.exe /c del C:\28876E~1.EXE > nul
Creates MutexC:\malware.exe
Creates ServiceMnopqr ewrwerwab Defghijk Mnop - C:\WINDOWS\nanvwo.exe

Process
↳ C:\WINDOWS\system32\cmd.exe /c del C:\28876E~1.EXE > nul

Creates Filenul
Deletes FileC:\malware.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
Creates File\Device\Afd\Endpoint
Winsock DNS192.168.1.1

Process
↳ Pid 796

Process
↳ Pid 844

Process
↳ Pid 1012

Process
↳ Pid 1112

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Process
↳ Pid 1860

Process
↳ Pid 1156

Process
↳ C:\WINDOWS\nanvwo.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\lpk.dll
Creates FilePIPE\DAV RPC SERVICE
Creates Filemm33.dll
Creates Filepipe\net\NtControlPipe10
Creates FilePIPE\wkssvc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Application Data\Adobe\Reader 9.3\Setup Files\Reader9\lpk.dll
Creates FileC:\temp\lpk.dll
Creates FileC:\RCX1.tmp
Creates File\Device\Afd\Endpoint
Creates FileC:\lpk.dll
Deletes Filemm33.dll
Creates MutexC:\WINDOWS\nanvwo.exe
Creates MutexMnopqr ertet Def
Creates MutexDBWinMutex

Network Details:

DNSlinfeng.sytes.net
Type: A
Flows TCP192.168.1.1:1031 ➝ 45.116.78.46:9090
Flows TCP192.168.1.1:1041 ➝ 45.116.78.46:9090
Flows TCP192.168.1.1:1051 ➝ 45.116.78.46:9090
Flows TCP192.168.1.1:1060 ➝ 45.116.78.46:9090
Flows TCP192.168.1.1:1028 ➝ 45.116.78.46:9090
Flows TCP192.168.1.1:1058 ➝ 45.116.78.46:9090

Raw Pcap

Strings