Analysis Date2015-07-25 07:52:09
MD538733e9f0be48f5e872f63a857ec235a
SHA187bd10f5ed648041740f0921b0c5c8e1f2b0c4f7

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 1d098660abdcbcb2ab0faa03af6166e4 sha1: 943bd04ebec5b5308b550b44d3eb650ca1cc4e17 size: 318976
Section.rdata md5: cdd9cdbeb49fea431a32aed47aec83c8 sha1: 555e80d58207a92be4bdd3a8bacbad5ae401b218 size: 59904
Section.data md5: 6b3a04f04747a4ae0b137c68825d25d9 sha1: bc4af48a1422a3ac6fa6cfcb9e9746640a62833d size: 7680
Section.reloc md5: f0b553ff4c7286a42dac022732fef1d9 sha1: 9723be8f55bd051075bf9aec64c8a437ad83da1d size: 26112
Timestamp2015-05-11 06:13:44
PackerMicrosoft Visual C++ 8
PEhashea0e9714a945f5d980080c8a31396a97b65b4f8e
IMPhashe598704ddb3d02bbd2fbd95069fcd36d
AVCA (E-Trust Ino)no_virus
AVRisingTrojan.Win32.Bayrod.b
AVMcafeePWS-FCCE!38733E9F0BE4
AVAvira (antivir)TR/Spy.ZBot.xbbeomq
AVTwisterno_virus
AVAd-AwareGen:Variant.Diley.1
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVEset (nod32)Win32/Bayrob.W
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Bayrob.T!tr
AVBitDefenderGen:Variant.Diley.1
AVK7Trojan ( 004c3a4d1 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AL
AVMicroWorld (escan)Gen:Variant.Diley.1
AVMalwareBytesTrojan.Agent.KVTGen
AVAuthentiumW32/Nivdort.B.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Bayrob
AVEmsisoftGen:Variant.Diley.1
AVZillya!Trojan.Bayrob.Win32.1212
AVKasperskyTrojan.Win32.Scar.jjcb
AVTrend MicroTROJ_BAYROB.SM0
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Diley.1
AVArcabit (arcavir)Gen:Variant.Diley.1
AVClamAVno_virus
AVDr. WebTrojan.Bayrob.1
AVF-SecureGen:Variant.Diley.1

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\mtyntqi\oyuunh
Creates FileC:\mtyntqi\kle1lgksz3khkmtfd.exe
Creates FileC:\WINDOWS\mtyntqi\oyuunh
Deletes FileC:\WINDOWS\mtyntqi\oyuunh
Creates ProcessC:\mtyntqi\kle1lgksz3khkmtfd.exe

Process
↳ C:\mtyntqi\kle1lgksz3khkmtfd.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Instrumentation Superfetch ➝
C:\mtyntqi\phtggerfavl.exe
Creates FileC:\mtyntqi\phtggerfavl.exe
Creates FileC:\mtyntqi\oyuunh
Creates FilePIPE\lsarpc
Creates FileC:\mtyntqi\yndshcdztwer
Creates FileC:\WINDOWS\mtyntqi\oyuunh
Deletes FileC:\WINDOWS\mtyntqi\oyuunh
Creates ProcessC:\mtyntqi\phtggerfavl.exe
Creates ServiceControl Endpoint RPC HomeGroup Quality - C:\mtyntqi\phtggerfavl.exe

Process
↳ Pid 808

Process
↳ Pid 856

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1116

Process
↳ Pid 1212

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Process
↳ Pid 1876

Process
↳ Pid 1156

Process
↳ C:\mtyntqi\phtggerfavl.exe

Creates FileC:\mtyntqi\kueozryh
Creates Filepipe\net\NtControlPipe10
Creates FileC:\mtyntqi\oyuunh
Creates FileC:\mtyntqi\qedvxfectat.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\mtyntqi\yndshcdztwer
Creates FileC:\WINDOWS\mtyntqi\oyuunh
Deletes FileC:\WINDOWS\mtyntqi\oyuunh
Creates Processvpvvdnpn1jkf "c:\mtyntqi\phtggerfavl.exe"

Process
↳ C:\mtyntqi\phtggerfavl.exe

Creates FileC:\mtyntqi\oyuunh
Creates FileC:\WINDOWS\mtyntqi\oyuunh
Deletes FileC:\WINDOWS\mtyntqi\oyuunh

Process
↳ vpvvdnpn1jkf "c:\mtyntqi\phtggerfavl.exe"

Creates FileC:\mtyntqi\oyuunh
Creates FileC:\WINDOWS\mtyntqi\oyuunh
Deletes FileC:\WINDOWS\mtyntqi\oyuunh

Network Details:

DNSfreshcatch.net
Type: A
192.155.217.146
DNScrowdcatch.net
Type: A
50.63.202.47
DNSsummerdress.net
Type: A
50.87.150.116
DNSpartydress.net
Type: A
208.73.211.195
DNSpartydress.net
Type: A
208.73.211.192
DNSpartydress.net
Type: A
208.73.211.183
DNSpartydress.net
Type: A
208.73.211.179
DNSlaughnotice.net
Type: A
95.211.230.75
DNSpartydistant.net
Type: A
DNSfightdistant.net
Type: A
DNSexperiencecatch.net
Type: A
DNSfresheearly.net
Type: A
DNSexperienceeearly.net
Type: A
DNSfreshpublic.net
Type: A
DNSexperiencepublic.net
Type: A
DNSfreshdress.net
Type: A
DNSexperiencedress.net
Type: A
DNSgentlemancatch.net
Type: A
DNSalreadycatch.net
Type: A
DNSgentlemaneearly.net
Type: A
DNSalreadyeearly.net
Type: A
DNSgentlemanpublic.net
Type: A
DNSalreadypublic.net
Type: A
DNSgentlemandress.net
Type: A
DNSalreadydress.net
Type: A
DNSfollowcatch.net
Type: A
DNSmembercatch.net
Type: A
DNSfolloweearly.net
Type: A
DNSmembereearly.net
Type: A
DNSfollowpublic.net
Type: A
DNSmemberpublic.net
Type: A
DNSfollowdress.net
Type: A
DNSmemberdress.net
Type: A
DNSbegincatch.net
Type: A
DNSknowncatch.net
Type: A
DNSbegineearly.net
Type: A
DNSknowneearly.net
Type: A
DNSbeginpublic.net
Type: A
DNSknownpublic.net
Type: A
DNSbegindress.net
Type: A
DNSknowndress.net
Type: A
DNSsummercatch.net
Type: A
DNSsummereearly.net
Type: A
DNScrowdeearly.net
Type: A
DNSsummerpublic.net
Type: A
DNScrowdpublic.net
Type: A
DNScrowddress.net
Type: A
DNSthoughtcatch.net
Type: A
DNSwatercatch.net
Type: A
DNSthoughteearly.net
Type: A
DNSwatereearly.net
Type: A
DNSthoughtpublic.net
Type: A
DNSwaterpublic.net
Type: A
DNSthoughtdress.net
Type: A
DNSwaterdress.net
Type: A
DNSwomancatch.net
Type: A
DNSsmokecatch.net
Type: A
DNSwomaneearly.net
Type: A
DNSsmokeeearly.net
Type: A
DNSwomanpublic.net
Type: A
DNSsmokepublic.net
Type: A
DNSwomandress.net
Type: A
DNSsmokedress.net
Type: A
DNSpartycatch.net
Type: A
DNSfightcatch.net
Type: A
DNSpartyeearly.net
Type: A
DNSfighteearly.net
Type: A
DNSpartypublic.net
Type: A
DNSfightpublic.net
Type: A
DNSfightdress.net
Type: A
DNSseveralength.net
Type: A
DNSlaughlength.net
Type: A
DNSseveranotice.net
Type: A
DNSseveraindeed.net
Type: A
DNSlaughindeed.net
Type: A
DNSseveraduring.net
Type: A
DNSlaughduring.net
Type: A
DNSsimplelength.net
Type: A
DNSmotherlength.net
Type: A
DNSsimplenotice.net
Type: A
DNSmothernotice.net
Type: A
DNSsimpleindeed.net
Type: A
DNSmotherindeed.net
Type: A
DNSsimpleduring.net
Type: A
DNSmotherduring.net
Type: A
DNSmountainlength.net
Type: A
DNSpossiblelength.net
Type: A
DNSmountainnotice.net
Type: A
HTTP GEThttp://freshcatch.net/index.php
User-Agent:
HTTP GEThttp://crowdcatch.net/index.php
User-Agent:
HTTP GEThttp://summerdress.net/index.php
User-Agent:
HTTP GEThttp://partydress.net/index.php
User-Agent:
HTTP GEThttp://laughnotice.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 192.155.217.146:80
Flows TCP192.168.1.1:1032 ➝ 50.63.202.47:80
Flows TCP192.168.1.1:1033 ➝ 50.87.150.116:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.195:80
Flows TCP192.168.1.1:1035 ➝ 95.211.230.75:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   72657368 63617463 682e6e65 740d0a0d   reshcatch.net...
0x00000050 (00080)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   726f7764 63617463 682e6e65 740d0a0d   rowdcatch.net...
0x00000050 (00080)   0a                                    .

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   756d6d65 72647265 73732e6e 65740d0a   ummerdress.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   61727479 64726573 732e6e65 740d0a0d   artydress.net...
0x00000050 (00080)   0a0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a206c   : close..Host: l
0x00000040 (00064)   61756768 6e6f7469 63652e6e 65740d0a   aughnotice.net..
0x00000050 (00080)   0d0a                                  ..


Strings