Analysis Date2016-02-12 19:48:50
MD5e75e5ead4c88ab81ec0ef319e18c4415
SHA14a3e673be10132ef577b5882fe6ad2344f2fc114

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: ebbb697eeb15689fc74168fd959a84b9 sha1: bf5fbc6f1e00040927c630ae4bcc5fafab670d0b size: 27648
Section.rdata md5: fc24f235d5a14c7ba716e6ae9fe7b95e sha1: 5ae67b02821e63239fd69db2a24089286358966a size: 13312
Section.data md5: 96528b0d2fcafdd3b8e49e9aa1825218 sha1: 48afa7493fec048081ed262fdf8fcd1200e14624 size: 4096
Section.rsrc md5: 7d3ef75654d1eee508c49836b53ed0b2 sha1: 5afdf91f87a47b855e23c5707063fe6a0d860afe size: 19456
Section.reloc md5: d7372416bd0cb20a05026ddc5b66c694 sha1: 377e6f1522e98ef92f2cd1cadcabe96fe5884df9 size: 4608
Timestamp2014-12-13 12:19:10
PackerMicrosoft Visual C++ 8
PEhash57c805462519a933fa98ef66e0909f9f0928b801
IMPhash9f4c6542128fba942a3b092c3a5337cf
AVCA (E-Trust Ino)Trojan.Generic.15803102
AVRisingNo Virus
AVMcafeeUpatre-FACH!E75E5EAD4C88
AVAvira (antivir)TR/Dldr.Upatre.MU
AVTwisterNo Virus
AVAd-AwareTrojan.Generic.15803102
AVAlwil (avast)Evo-gen [Susp]
AVEset (nod32)Win32/Kryptik.DPGO
AVGrisoft (avg)Generic_s.FAO
AVSymantecDownloader.Upatre!gen5
AVFortinetW32/Kryptik.DQAA!tr
AVBitDefenderTrojan.Generic.15803102
AVK7Trojan ( 004c7fc91 )
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre!rfn
AVMicroWorld (escan)Trojan.Generic.15803102
AVMalwareBytesTrojan.Upatre
AVAuthentiumW32/Upatre.BP.gen!Eldorado
AVEmsisoftTrojan.Generic.15803102
AVFrisk (f-prot)W32/Upatre.BP.gen!Eldorado
AVIkarusNo Virus
AVZillya!Trojan.Kryptik.Win32.860956
AVKasperskyTrojan.Win32.Generic
AVTrend MicroTROJ_UPATRE.SM37
AVVirusBlokAda (vba32)No Virus
AVCAT (quickheal)Trojan.Kadena.B4
AVBullGuardTrojan.Generic.15803102
AVArcabit (arcavir)Error Scanning File
AVClamAVWin.Trojan.Upatre-6087
AVDr. WebTrojan.DownLoader19.15156
AVF-SecureTrojan.Generic.15803102

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\vadftol.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\vadftol.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\vadftol.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS96.46.99.215
Winsock DNS188.255.243.105
Winsock DNS194.106.166.22
Winsock DNS188.255.236.184
Winsock DNS68.119.5.32
Winsock DNS38.65.142.12
Winsock DNSicanhazip.com

Network Details:

DNSicanhazip.com
Type: A
45.32.200.23
DNSicanhazip.com
Type: A
104.238.162.182
HTTP GEThttp://icanhazip.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
HTTP GEThttp://38.65.142.12:12558/KK22/COMPUTER-XXXXXX/0/51-SP3/0/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
Flows TCP192.168.1.1:1031 ➝ 45.32.200.23:80
Flows TCP192.168.1.1:1032 ➝ 38.65.142.12:12558
Flows TCP192.168.1.1:1033 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1034 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1035 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1036 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1037 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1038 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1039 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1040 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1041 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1042 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1043 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1044 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1045 ➝ 188.255.236.184:443
Flows TCP192.168.1.1:1046 ➝ 188.255.236.184:443
Flows TCP192.168.1.1:1047 ➝ 188.255.236.184:443
Flows TCP192.168.1.1:1048 ➝ 188.255.236.184:443
Flows TCP192.168.1.1:1049 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1050 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1051 ➝ 96.46.99.215:443
Flows TCP192.168.1.1:1052 ➝ 96.46.99.215:443

Raw Pcap
0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   41636365 70743a20 74657874 2f2a2c20   Accept: text/*, 
0x00000020 (00032)   6170706c 69636174 696f6e2f 2a0d0a55   application/*..U
0x00000030 (00048)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000040 (00064)   6c612f35 2e302028 57696e64 6f777320   la/5.0 (Windows 
0x00000050 (00080)   4e542036 2e313b57 4f573634 29204170   NT 6.1;WOW64) Ap
0x00000060 (00096)   706c6557 65624b69 742f3533 372e3336   pleWebKit/537.36
0x00000070 (00112)   20284b48 544d4c2c 206c696b 65204765    (KHTML, like Ge
0x00000080 (00128)   636b6f29 20436872 6f6d652f 34312e30   cko) Chrome/41.0
0x00000090 (00144)   2e323237 322e3839 20536166 6172692f   .2272.89 Safari/
0x000000a0 (00160)   3533372e 3336204f 50522f32 382e302e   537.36 OPR/28.0.
0x000000b0 (00176)   31373530 2e34380d 0a486f73 743a2069   1750.48..Host: i
0x000000c0 (00192)   63616e68 617a6970 2e636f6d 0d0a4361   canhazip.com..Ca
0x000000d0 (00208)   6368652d 436f6e74 726f6c3a 206e6f2d   che-Control: no-
0x000000e0 (00224)   63616368 650d0a0d 0a                  cache....

0x00000000 (00000)   47455420 2f4b4b32 322f434f 4d505554   GET /KK22/COMPUT
0x00000010 (00016)   45522d58 58585858 582f302f 35312d53   ER-XXXXXX/0/51-S
0x00000020 (00032)   50332f30 2f204854 54502f31 2e310d0a   P3/0/ HTTP/1.1..
0x00000030 (00048)   55736572 2d416765 6e743a20 4d6f7a69   User-Agent: Mozi
0x00000040 (00064)   6c6c612f 352e3020 2857696e 646f7773   lla/5.0 (Windows
0x00000050 (00080)   204e5420 362e313b 574f5736 34292041    NT 6.1;WOW64) A
0x00000060 (00096)   70706c65 5765624b 69742f35 33372e33   ppleWebKit/537.3
0x00000070 (00112)   3620284b 48544d4c 2c206c69 6b652047   6 (KHTML, like G
0x00000080 (00128)   65636b6f 29204368 726f6d65 2f34312e   ecko) Chrome/41.
0x00000090 (00144)   302e3232 37322e38 39205361 66617269   0.2272.89 Safari
0x000000a0 (00160)   2f353337 2e333620 4f50522f 32382e30   /537.36 OPR/28.0
0x000000b0 (00176)   2e313735 302e3438 0d0a486f 73743a20   .1750.48..Host: 
0x000000c0 (00192)   33382e36 352e3134 322e3132 3a313235   38.65.142.12:125
0x000000d0 (00208)   35380d0a 43616368 652d436f 6e74726f   58..Cache-Contro
0x000000e0 (00224)   6c3a206e 6f2d6361 6368650d 0a0d0a     l: no-cache....

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.


Strings