Analysis Date2015-12-18 23:24:25
MD527cedb7e36f2bfe539707941160a4cb1
SHA196780c85ec3f73670e002db1da799a350652aca5

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: e207845533cb95c293535937165b7aa5 sha1: cf636a3177293e7209c931d6859586c233f07b41 size: 12288
Section.rdata md5: 7f4e36ad3e3918fcdecce65c0fd69537 sha1: 631fe10d1bcb4bad19e08b7f9f4e4a15664356f6 size: 3072
Section.data md5: f6ec6ddbc69c82317cbf66b3c138f443 sha1: 5ca194f1cd10e32a046a727f81b67e9b8290b408 size: 1024
Section.rsrc md5: d93a2fc18b4dcfd65fccaf07a268aa1f sha1: 3e5f123861f3993d9aacb74a132125879bf78d29 size: 22016
Timestamp2015-02-12 14:43:40
PackerMicrosoft Visual C 2.0
PEhash99fb8c4b20deaf85ad4ea6bffa73f36519f1f320
IMPhash82cedb12d90ebc9b82cb1b1846446517
AVTrend MicroTROJ_UP.3D28C075
AVK7Trojan ( 004c58d11 )
AVAvira (antivir)TR/Agent.39560.1
AVDr. WebTrojan.Upatre.4408
AVTwisterTrojan.DOMG.erxc
AVClamAVno_virus
AVBitDefenderTrojan.GenericKD.2483425
AVMalwareBytesTrojan.Upatre.VT
AVFortinetW32/Kryptik.DLXT!tr
AVEset (nod32)Win32/Kryptik.DLZD
AVEmsisoftTrojan.GenericKD.2483425
AVZillya!Downloader.CTBLocker.Win32.12
AVMcafeeUpatre-FACH!27CEDB7E36F2
AVGrisoft (avg)Crypt4.AVLC
AVCAT (quickheal)Trojan.Kadena.B4
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVMicroWorld (escan)Trojan.GenericKD.2483425
AVIkarusTrojan.Win32.Crypt
AVAd-AwareTrojan.GenericKD.2483425
AVRisingno_virus
AVF-SecureTrojan.GenericKD.2483425
AVKasperskyTrojan.Win32.Generic
AVVirusBlokAda (vba32)no_virus
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre
AVSymantecDownloader.Upatre!gen5
AVArcabit (arcavir)Trojan.GenericKD.2483425
AVCA (E-Trust Ino)no_virus
AVAuthentiumW32/Upatre.AR.gen!Eldorado
AVBullGuardTrojan.GenericKD.2483425
AVFrisk (f-prot)W32/Upatre.AR.gen!Eldorado

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\famudit.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\famudit.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\famudit.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Deletes FileC:\malware.exe
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS188.255.169.176
Winsock DNS188.120.194.101
Winsock DNS162.255.126.8
Winsock DNS216.254.231.11
Winsock DNS69.163.81.211
Winsock DNS68.190.246.142
Winsock DNS24.33.131.116
Winsock DNSicanhazip.com
Winsock DNS75.137.112.81

Network Details:

DNSicanhazip.com
Type: A
64.182.208.185
DNSicanhazip.com
Type: A
64.182.208.184
HTTP GEThttp://icanhazip.com/
User-Agent: Internet download
HTTP GEThttp://188.120.194.101:13133/Til21/COMPUTER-XXXXXX/0/51-SP3/0/
User-Agent: Internet download
Flows TCP192.168.1.1:1031 ➝ 64.182.208.185:80
Flows TCP192.168.1.1:1032 ➝ 188.120.194.101:13133
Flows TCP192.168.1.1:1033 ➝ 68.190.246.142:443
Flows TCP192.168.1.1:1034 ➝ 68.190.246.142:443
Flows TCP192.168.1.1:1035 ➝ 68.190.246.142:443
Flows TCP192.168.1.1:1036 ➝ 68.190.246.142:443
Flows TCP192.168.1.1:1037 ➝ 188.255.169.176:443
Flows TCP192.168.1.1:1038 ➝ 188.255.169.176:443
Flows TCP192.168.1.1:1039 ➝ 188.255.169.176:443
Flows TCP192.168.1.1:1040 ➝ 188.255.169.176:443
Flows TCP192.168.1.1:1041 ➝ 162.255.126.8:443
Flows TCP192.168.1.1:1042 ➝ 162.255.126.8:443
Flows TCP192.168.1.1:1043 ➝ 162.255.126.8:443
Flows TCP192.168.1.1:1044 ➝ 162.255.126.8:443
Flows TCP192.168.1.1:1045 ➝ 75.137.112.81:443
Flows TCP192.168.1.1:1046 ➝ 75.137.112.81:443
Flows TCP192.168.1.1:1047 ➝ 75.137.112.81:443
Flows TCP192.168.1.1:1048 ➝ 75.137.112.81:443
Flows TCP192.168.1.1:1049 ➝ 69.163.81.211:443
Flows TCP192.168.1.1:1050 ➝ 69.163.81.211:443
Flows TCP192.168.1.1:1051 ➝ 69.163.81.211:443
Flows TCP192.168.1.1:1052 ➝ 69.163.81.211:443
Flows TCP192.168.1.1:1053 ➝ 216.254.231.11:443
Flows TCP192.168.1.1:1054 ➝ 216.254.231.11:443
Flows TCP192.168.1.1:1055 ➝ 216.254.231.11:443
Flows TCP192.168.1.1:1056 ➝ 216.254.231.11:443
Flows TCP192.168.1.1:1057 ➝ 24.33.131.116:443
Flows TCP192.168.1.1:1058 ➝ 24.33.131.116:443

Raw Pcap
0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   41636365 70743a20 74657874 2f2a2c20   Accept: text/*, 
0x00000020 (00032)   6170706c 69636174 696f6e2f 2a0d0a55   application/*..U
0x00000030 (00048)   7365722d 4167656e 743a2049 6e746572   ser-Agent: Inter
0x00000040 (00064)   6e657420 646f776e 6c6f6164 0d0a486f   net download..Ho
0x00000050 (00080)   73743a20 6963616e 68617a69 702e636f   st: icanhazip.co
0x00000060 (00096)   6d0d0a43 61636865 2d436f6e 74726f6c   m..Cache-Control
0x00000070 (00112)   3a206e6f 2d636163 68650d0a 0d0a       : no-cache....

0x00000000 (00000)   47455420 2f54696c 32312f43 4f4d5055   GET /Til21/COMPU
0x00000010 (00016)   5445522d 58585858 58582f30 2f35312d   TER-XXXXXX/0/51-
0x00000020 (00032)   5350332f 302f2048 5454502f 312e310d   SP3/0/ HTTP/1.1.
0x00000030 (00048)   0a557365 722d4167 656e743a 20496e74   .User-Agent: Int
0x00000040 (00064)   65726e65 7420646f 776e6c6f 61640d0a   ernet download..
0x00000050 (00080)   486f7374 3a203138 382e3132 302e3139   Host: 188.120.19
0x00000060 (00096)   342e3130 313a3133 3133330d 0a436163   4.101:13133..Cac
0x00000070 (00112)   68652d43 6f6e7472 6f6c3a20 6e6f2d63   he-Control: no-c
0x00000080 (00128)   61636865 0d0a0d0a                     ache....

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.


Strings