Analysis Date2015-08-14 10:19:52
MD5ea16748c3a38e4bad2cb594dd194726b
SHA13481a71811bdd9eb9c9a21f6867e9f971381ec73

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 638c0f292c93a97e9928729b2d9c87a6 sha1: b92b3974b3c3bf9940444c08987c8c2b00080dec size: 198144
Section.rdata md5: 76fc9457b8f206a9737ea4fd9609f298 sha1: e88ab27d3deadab5b64417c1b494845fd5482352 size: 52736
Section.data md5: 9b140bc903cb39b667fe44e1e2289fed sha1: bbc9e3ba7ec01bf53c6a1eb21ce89600660e6064 size: 7168
Section.reloc md5: 1470f1e4bb559ef7d3a9e833a9e1affb sha1: 0ce333af5029bf68b4a344397eb37704e5351667 size: 14336
Timestamp2015-04-29 19:18:36
PackerMicrosoft Visual C++ 8
PEhashcf0945e21ea3d897a3f74fd2efdf937c4e20ef51
IMPhashea09f92ea0ffb532009bb7e6d8478105
AVVirusBlokAda (vba32)Trojan.Scar
AVArcabit (arcavir)Gen:Variant.Diley.1
AVPadvishno_virus
AVAlwil (avast)VB-AJEW [Trj]
AVK7Trojan ( 004c12491 )
AVAd-AwareGen:Variant.Diley.1
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVFortinetW32/Generic.AC.215362
AVAvira (antivir)TR/Crypt.Xpack.196101
AVBullGuardGen:Variant.Diley.1
AVMicroWorld (escan)Gen:Variant.Diley.1
AVF-SecureGen:Variant.Diley.1
AVMalwareBytesTrojan.Agent.KVTGen
AVCA (E-Trust Ino)no_virus
AVTrend MicroTROJ_BAYROB.SM0
AVIkarusTrojan.Win32.Bayrob
AVTwisterTrojan.0000E9000000006A1.mg
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AY
AVRisingTrojan.Win32.Bayrod.a
AVEmsisoftGen:Variant.Diley.1
AVFrisk (f-prot)no_virus
AVZillya!no_virus
AVGrisoft (avg)Win32/Cryptor
AVClamAVno_virus
AVAuthentiumW32/Scar.R.gen!Eldorado
AVBitDefenderGen:Variant.Diley.1
AVKasperskyTrojan.Win32.Generic
AVDr. WebTrojan.Bayrob.1
AVMcafeeTrojan-FGIJ!EA16748C3A38
AVEset (nod32)Win32/Bayrob.Q
AVSymantecDownloader.Upatre!g15

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\qmlpkae\xycayt47oexvcqxkl.exe
Creates FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates FileC:\qmlpkae\c2ktgnlm
Deletes FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates ProcessC:\qmlpkae\xycayt47oexvcqxkl.exe

Process
↳ C:\qmlpkae\xycayt47oexvcqxkl.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Transaction Interface DHCP Tunneling ➝
C:\qmlpkae\ppocqqtdxxvn.exe
Creates FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates FileC:\qmlpkae\tzcovtjllgl
Creates FileC:\qmlpkae\ppocqqtdxxvn.exe
Creates FilePIPE\lsarpc
Creates FileC:\qmlpkae\c2ktgnlm
Deletes FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates ProcessC:\qmlpkae\ppocqqtdxxvn.exe

Process
↳ C:\qmlpkae\ppocqqtdxxvn.exe

Creates FileC:\qmlpkae\qhwrn3xn
Creates FileC:\qmlpkae\pvemmntsjxib.exe
Creates FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates FileC:\qmlpkae\tzcovtjllgl
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\qmlpkae\c2ktgnlm
Deletes FileC:\qmlpkae\xycayt47oexvcqxkl.exe
Deletes FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates Processctkrjygal2ar "c:\qmlpkae\ppocqqtdxxvn.exe"

Process
↳ ctkrjygal2ar "c:\qmlpkae\ppocqqtdxxvn.exe"

Creates FileC:\WINDOWS\qmlpkae\c2ktgnlm
Creates FileC:\qmlpkae\c2ktgnlm
Deletes FileC:\WINDOWS\qmlpkae\c2ktgnlm

Network Details:

DNSrightforest.net
Type: A
98.130.238.135
DNSenglishforest.net
Type: A
59.188.232.88
DNSpersonschool.net
Type: A
165.160.13.20
DNSpersonschool.net
Type: A
165.160.15.20
DNSforeignquestion.net
Type: A
195.22.26.231
DNSforeignquestion.net
Type: A
195.22.26.252
DNSforeignquestion.net
Type: A
195.22.26.253
DNSforeignquestion.net
Type: A
195.22.26.254
DNSrightschool.net
Type: A
82.144.197.54
DNSrightquestion.net
Type: A
208.91.197.27
DNSfamilyschool.net
Type: A
50.63.202.104
DNSchildrenwhile.net
Type: A
95.211.230.75
DNSfigurewheat.net
Type: A
DNSthoughwheat.net
Type: A
DNSfigureanger.net
Type: A
DNSthoughanger.net
Type: A
DNSfigurealways.net
Type: A
DNSthoughalways.net
Type: A
DNSfigureforest.net
Type: A
DNSthoughforest.net
Type: A
DNSpicturewheat.net
Type: A
DNScigarettewheat.net
Type: A
DNSpictureanger.net
Type: A
DNScigaretteanger.net
Type: A
DNSpicturealways.net
Type: A
DNScigarettealways.net
Type: A
DNSpictureforest.net
Type: A
DNScigaretteforest.net
Type: A
DNSchildrenwheat.net
Type: A
DNSfamilywheat.net
Type: A
DNSchildrenanger.net
Type: A
DNSfamilyanger.net
Type: A
DNSchildrenalways.net
Type: A
DNSfamilyalways.net
Type: A
DNSchildrenforest.net
Type: A
DNSfamilyforest.net
Type: A
DNSeitherwheat.net
Type: A
DNSenglishwheat.net
Type: A
DNSeitheranger.net
Type: A
DNSenglishanger.net
Type: A
DNSeitheralways.net
Type: A
DNSenglishalways.net
Type: A
DNSeitherforest.net
Type: A
DNSexpectschool.net
Type: A
DNSbecauseschool.net
Type: A
DNSexpectwhile.net
Type: A
DNSbecausewhile.net
Type: A
DNSexpectquestion.net
Type: A
DNSbecausequestion.net
Type: A
DNSexpecttherefore.net
Type: A
DNSbecausetherefore.net
Type: A
DNSmachineschool.net
Type: A
DNSpersonwhile.net
Type: A
DNSmachinewhile.net
Type: A
DNSpersonquestion.net
Type: A
DNSmachinequestion.net
Type: A
DNSpersontherefore.net
Type: A
DNSmachinetherefore.net
Type: A
DNSsuddenschool.net
Type: A
DNSforeignschool.net
Type: A
DNSsuddenwhile.net
Type: A
DNSforeignwhile.net
Type: A
DNSsuddenquestion.net
Type: A
DNSsuddentherefore.net
Type: A
DNSforeigntherefore.net
Type: A
DNSwhetherschool.net
Type: A
DNSwhetherwhile.net
Type: A
DNSrightwhile.net
Type: A
DNSwhetherquestion.net
Type: A
DNSwhethertherefore.net
Type: A
DNSrighttherefore.net
Type: A
DNSfigureschool.net
Type: A
DNSthoughschool.net
Type: A
DNSfigurewhile.net
Type: A
DNSthoughwhile.net
Type: A
DNSfigurequestion.net
Type: A
DNSthoughquestion.net
Type: A
DNSfiguretherefore.net
Type: A
DNSthoughtherefore.net
Type: A
DNSpictureschool.net
Type: A
DNScigaretteschool.net
Type: A
DNSpicturewhile.net
Type: A
DNScigarettewhile.net
Type: A
DNSpicturequestion.net
Type: A
DNScigarettequestion.net
Type: A
DNSpicturetherefore.net
Type: A
DNScigarettetherefore.net
Type: A
DNSchildrenschool.net
Type: A
DNSfamilywhile.net
Type: A
HTTP GEThttp://rightforest.net/index.php
User-Agent:
HTTP GEThttp://englishforest.net/index.php
User-Agent:
HTTP GEThttp://personschool.net/index.php
User-Agent:
HTTP GEThttp://foreignquestion.net/index.php
User-Agent:
HTTP GEThttp://rightschool.net/index.php
User-Agent:
HTTP GEThttp://rightquestion.net/index.php
User-Agent:
HTTP GEThttp://familyschool.net/index.php
User-Agent:
HTTP GEThttp://childrenwhile.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 98.130.238.135:80
Flows TCP192.168.1.1:1032 ➝ 59.188.232.88:80
Flows TCP192.168.1.1:1033 ➝ 165.160.13.20:80
Flows TCP192.168.1.1:1034 ➝ 195.22.26.231:80
Flows TCP192.168.1.1:1035 ➝ 82.144.197.54:80
Flows TCP192.168.1.1:1036 ➝ 208.91.197.27:80
Flows TCP192.168.1.1:1037 ➝ 50.63.202.104:80
Flows TCP192.168.1.1:1038 ➝ 95.211.230.75:80

Raw Pcap

Strings