Analysis Date2015-07-30 23:30:18
MD5e786e9d23cceafe9f0b2f5cb56faa6fd
SHA12fb18526d4efa1db8fcc0241a1ea7d7bb812dd6e

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 8d6c207943b181342873ed7eacc8a979 sha1: ce29dd32295f623013e17a65bb4a7e3c3fffd37b size: 197632
Section.rdata md5: 87d4d441cedc7ace8871a199cc144401 sha1: 1b5bef44cd8ec9963ad0e866c6cb630cc52a7718 size: 52736
Section.data md5: f25785f4335a61fcb2fa0e51ae5ff0aa sha1: 11ce47a40fbe87b927d9b5c39a6db21e451ec246 size: 7680
Section.reloc md5: 00d85b8fe8eba9c961c7edbbb1069159 sha1: 5d0ca1cc6a3077a4c678d7a49ee2bf4103f268db size: 14336
Timestamp2015-04-29 19:21:35
PackerMicrosoft Visual C++ 8
PEhashe2e0d90f3928edb94d6389992cb1d7c4fa3847d5
IMPhashf3c409e6cb1418202495e94181af1884
AVVirusBlokAda (vba32)Trojan.Scar
AVTwisterTrojan.0000E9000000006A1.mg
AVClamAVWin.Trojan.Agent-870284
AVEmsisoftGen:Variant.Kazy.604861
AVIkarusTrojan.Win32.Bayrob
AVGrisoft (avg)Win32/Cryptor
AVFortinetW32/Generic.AC.215362
AVMcafeeTrojan-FGIJ!E786E9D23CCE
AVBullGuardGen:Variant.Kazy.604861
AVSymantecDownloader.Upatre!g15
AVZillya!Trojan.Scar.Win32.88628
AVEset (nod32)Win32/Bayrob.Q
AVDr. WebTrojan.Bayrob.1
AVCA (E-Trust Ino)no_virus
AVAvira (antivir)TR/Crypt.Xpack.197945
AVAd-AwareGen:Variant.Kazy.604861
AVBitDefenderGen:Variant.Kazy.604861
AVFrisk (f-prot)no_virus
AVAuthentiumW32/Scar.R.gen!Eldorado
AVMicroWorld (escan)Gen:Variant.Kazy.604861
AVRisingTrojan.Win32.Bayrod.a
AVKasperskyTrojan.Win32.Generic
AVTrend MicroTROJ_BAYROB.SM0
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVArcabit (arcavir)Gen:Variant.Kazy.604861
AVF-SecureGen:Variant.Kazy.604861
AVAlwil (avast)VB-AJEW [Trj]
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AY
AVK7Trojan ( 004c12491 )
AVMalwareBytesTrojan.Agent.KVTGen
AVPadvishno_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\qopeyhingjhqbnv\fqzvwhfm9
Creates FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Creates FileC:\qopeyhingjhqbnv\l2em1leuievtitg9gr.exe
Deletes FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Creates ProcessC:\qopeyhingjhqbnv\l2em1leuievtitg9gr.exe

Process
↳ C:\qopeyhingjhqbnv\l2em1leuievtitg9gr.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\SNMP User-mode Telephony Redirector Helper ➝
C:\qopeyhingjhqbnv\ffgcloxq.exe
Creates FileC:\qopeyhingjhqbnv\ffgcloxq.exe
Creates FileC:\qopeyhingjhqbnv\fqzvwhfm9
Creates FileC:\qopeyhingjhqbnv\ofanjdtgc
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Deletes FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Creates ProcessC:\qopeyhingjhqbnv\ffgcloxq.exe

Process
↳ C:\qopeyhingjhqbnv\ffgcloxq.exe

Creates FileC:\qopeyhingjhqbnv\bdxoc1v
Creates FileC:\qopeyhingjhqbnv\fqzvwhfm9
Creates FileC:\qopeyhingjhqbnv\ofanjdtgc
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Creates FileC:\qopeyhingjhqbnv\buxkqab.exe
Deletes FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Deletes FileC:\qopeyhingjhqbnv\l2em1leuievtitg9gr.exe
Creates Processalxc0ybwguz5 "c:\qopeyhingjhqbnv\ffgcloxq.exe"

Process
↳ alxc0ybwguz5 "c:\qopeyhingjhqbnv\ffgcloxq.exe"

Creates FileC:\qopeyhingjhqbnv\fqzvwhfm9
Creates FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9
Deletes FileC:\WINDOWS\qopeyhingjhqbnv\fqzvwhfm9

Network Details:

DNSfreshpower.net
Type: A
195.149.84.101
DNSfreshpower.net
Type: A
195.149.84.100
DNScrowdfamous.net
Type: A
95.211.230.75
DNScrowdpower.net
Type: A
162.244.253.60
DNSthoughtpower.net
Type: A
23.229.204.192
DNSwaterpower.net
Type: A
72.52.4.120
DNSwomanpower.net
Type: A
72.52.4.120
DNSpartypower.net
Type: A
66.151.181.49
DNSfightpower.net
Type: A
64.99.80.30
DNSmelbourneit.hotkeysparking.com
Type: A
8.5.1.16
DNSfightcountry.net
Type: A
184.168.221.55
DNSexperiencecentury.net
Type: A
DNSfreshfamous.net
Type: A
DNSexperiencefamous.net
Type: A
DNSexperiencepower.net
Type: A
DNSfreshcountry.net
Type: A
DNSexperiencecountry.net
Type: A
DNSgentlemancentury.net
Type: A
DNSalreadycentury.net
Type: A
DNSgentlemanfamous.net
Type: A
DNSalreadyfamous.net
Type: A
DNSgentlemanpower.net
Type: A
DNSalreadypower.net
Type: A
DNSgentlemancountry.net
Type: A
DNSalreadycountry.net
Type: A
DNSfollowcentury.net
Type: A
DNSmembercentury.net
Type: A
DNSfollowfamous.net
Type: A
DNSmemberfamous.net
Type: A
DNSfollowpower.net
Type: A
DNSmemberpower.net
Type: A
DNSfollowcountry.net
Type: A
DNSmembercountry.net
Type: A
DNSbegincentury.net
Type: A
DNSknowncentury.net
Type: A
DNSbeginfamous.net
Type: A
DNSknownfamous.net
Type: A
DNSbeginpower.net
Type: A
DNSknownpower.net
Type: A
DNSbegincountry.net
Type: A
DNSknowncountry.net
Type: A
DNSsummercentury.net
Type: A
DNScrowdcentury.net
Type: A
DNSsummerfamous.net
Type: A
DNSsummerpower.net
Type: A
DNSsummercountry.net
Type: A
DNScrowdcountry.net
Type: A
DNSthoughtcentury.net
Type: A
DNSwatercentury.net
Type: A
DNSthoughtfamous.net
Type: A
DNSwaterfamous.net
Type: A
DNSthoughtcountry.net
Type: A
DNSwatercountry.net
Type: A
DNSwomancentury.net
Type: A
DNSsmokecentury.net
Type: A
DNSwomanfamous.net
Type: A
DNSsmokefamous.net
Type: A
DNSsmokepower.net
Type: A
DNSwomancountry.net
Type: A
DNSsmokecountry.net
Type: A
DNSpartycentury.net
Type: A
DNSfightcentury.net
Type: A
DNSpartyfamous.net
Type: A
DNSfightfamous.net
Type: A
DNSpartycountry.net
Type: A
DNSfreshsurprise.net
Type: A
DNSexperiencesurprise.net
Type: A
DNSfreshbeside.net
Type: A
DNSexperiencebeside.net
Type: A
DNSfreshletter.net
Type: A
DNSexperienceletter.net
Type: A
DNSfreshdifferent.net
Type: A
DNSexperiencedifferent.net
Type: A
DNSgentlemansurprise.net
Type: A
DNSalreadysurprise.net
Type: A
DNSgentlemanbeside.net
Type: A
DNSalreadybeside.net
Type: A
DNSgentlemanletter.net
Type: A
DNSalreadyletter.net
Type: A
DNSgentlemandifferent.net
Type: A
DNSalreadydifferent.net
Type: A
DNSfollowsurprise.net
Type: A
DNSmembersurprise.net
Type: A
DNSfollowbeside.net
Type: A
DNSmemberbeside.net
Type: A
DNSfollowletter.net
Type: A
DNSmemberletter.net
Type: A
HTTP GEThttp://freshpower.net/index.php
User-Agent:
HTTP GEThttp://crowdfamous.net/index.php
User-Agent:
HTTP GEThttp://crowdpower.net/index.php
User-Agent:
HTTP GEThttp://thoughtpower.net/index.php
User-Agent:
HTTP GEThttp://waterpower.net/index.php
User-Agent:
HTTP GEThttp://womanpower.net/index.php
User-Agent:
HTTP GEThttp://partypower.net/index.php
User-Agent:
HTTP GEThttp://fightpower.net/index.php
User-Agent:
HTTP GEThttp://partycountry.net/index.php
User-Agent:
HTTP GEThttp://fightcountry.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 195.149.84.101:80
Flows TCP192.168.1.1:1032 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1033 ➝ 162.244.253.60:80
Flows TCP192.168.1.1:1034 ➝ 23.229.204.192:80
Flows TCP192.168.1.1:1035 ➝ 72.52.4.120:80
Flows TCP192.168.1.1:1036 ➝ 72.52.4.120:80
Flows TCP192.168.1.1:1037 ➝ 66.151.181.49:80
Flows TCP192.168.1.1:1038 ➝ 64.99.80.30:80
Flows TCP192.168.1.1:1039 ➝ 8.5.1.16:80
Flows TCP192.168.1.1:1040 ➝ 184.168.221.55:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   72657368 706f7765 722e6e65 740d0a0d   reshpower.net...
0x00000050 (00080)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   726f7764 66616d6f 75732e6e 65740d0a   rowdfamous.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   726f7764 706f7765 722e6e65 740d0a0d   rowdpower.net...
0x00000050 (00080)   0a0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2074   : close..Host: t
0x00000040 (00064)   686f7567 6874706f 7765722e 6e65740d   houghtpower.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   61746572 706f7765 722e6e65 740d0a0d   aterpower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   6f6d616e 706f7765 722e6e65 740d0a0d   omanpower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   61727479 706f7765 722e6e65 740d0a0d   artypower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   69676874 706f7765 722e6e65 740d0a0d   ightpower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   61727479 636f756e 7472792e 6e65740d   artycountry.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   69676874 636f756e 7472792e 6e65740d   ightcountry.net.
0x00000050 (00080)   0a0d0a                                ...


Strings