Analysis Date | 2014-06-15 17:34:48 |
---|---|
MD5 | bceeec7e880e217e12953b8e8c945ca8 |
SHA1 | a4db7bbee81c0f296e7c695a665d60411b2880f6 |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 | |
---|---|---|
Section | .text md5: d7b3fae21018d2358124d7020b58aeb9 sha1: 8c92a76aa79ee2c8e8a0bd7947507d82e61614c2 size: 103424 | |
Section | .rdata md5: 68c3c005bc96c6e3a3d068ce05082794 sha1: 738d35bc5d5b4695d8aeb1f3c17198bb049e034b size: 1536 | |
Section | .data md5: 3f95aa19eccfe1837356323dd635f5cf sha1: 60fa917579c1f4799cabf0e75faf2d7dcbbe6581 size: 59904 | |
Section | .isete md5: 7131107577d3b4507b06ce454eaa089b sha1: 34200ad626fbe4e9838767c2c557cdc41ae10a3b size: 1024 | |
Timestamp | 2005-11-15 10:40:49 | |
Version | ProductVersion: 1.0.0.3 FileVersion: 1.0.0.3 PrivateBuild: 1649 | |
PEhash | 9b75a77302d2a21b49fafc40af31158f73bcf8c7 | |
IMPhash | e075b74e2c08cbf3081a48f6ef406d8b | |
AV | 360 Safe | Gen:Trojan.Heur.KS.1 |
AV | 360 Safe | Gen:Trojan.Heur.KS.1 |
AV | Ad-Aware | Gen:Trojan.Heur.KS.1 |
AV | Ad-Aware | Gen:Trojan.Heur.KS.1 |
AV | Alwil (avast) | Cybota [Trj] |
AV | Alwil (avast) | Cybota [Trj] |
AV | Arcabit (arcavir) | no_virus |
AV | Arcabit (arcavir) | no_virus |
AV | Authentium | W32/Goolbot.G.gen!Eldorado |
AV | Authentium | W32/Goolbot.G.gen!Eldorado |
AV | Avira (antivir) | BDS/Gbot.aida |
AV | Avira (antivir) | BDS/Gbot.aida |
AV | CA (E-Trust Ino) | Win32/Diple.A!generic |
AV | CA (E-Trust Ino) | Win32/Diple.A!generic |
AV | CAT (quickheal) | Backdoor.Cycbot.B |
AV | CAT (quickheal) | Backdoor.Cycbot.B |
AV | ClamAV | Win.Trojan.Gbot-683 |
AV | ClamAV | Win.Trojan.Gbot-683 |
AV | Dr. Web | BackDoor.Gbot.21 |
AV | Dr. Web | BackDoor.Gbot.21 |
AV | Emsisoft | Gen:Trojan.Heur.KS.1 |
AV | Emsisoft | Gen:Trojan.Heur.KS.1 |
AV | Eset (nod32) | Win32/Kryptik.MEH |
AV | Eset (nod32) | Win32/Kryptik.MEH |
AV | Fortinet | W32/FraudLoad.MK!tr |
AV | Fortinet | W32/FraudLoad.MK!tr |
AV | Frisk (f-prot) | W32/Goolbot.G.gen!Eldorado (generic, not disinfectable) |
AV | Frisk (f-prot) | W32/Goolbot.G.gen!Eldorado (generic, not disinfectable) |
AV | F-Secure | Gen:Trojan.Heur.KS.1 |
AV | F-Secure | Gen:Trojan.Heur.KS.1 |
AV | Grisoft (avg) | FakeAlert.AAX |
AV | Grisoft (avg) | FakeAlert.AAX |
AV | Ikarus | Backdoor.Win32.Gbot |
AV | Ikarus | Backdoor.Win32.Gbot |
AV | Kaspersky | Backdoor.Win32.Gbot.apa |
AV | Kaspersky | Backdoor.Win32.Gbot.apa |
AV | MalwareBytes | Trojan.Agent |
AV | MalwareBytes | Trojan.Agent |
AV | Mcafee | BackDoor-EXI.gen.i |
AV | Mcafee | BackDoor-EXI.gen.i |
AV | Microsoft Security Essentials | Backdoor:Win32/Cycbot.G |
AV | Microsoft Security Essentials | Backdoor:Win32/Cycbot.G |
AV | MicroWorld (escan) | Gen:Trojan.Heur.KS.1 |
AV | MicroWorld (escan) | Gen:Trojan.Heur.KS.1 |
AV | Norman | winpe/Cycbot.BP |
AV | Norman | winpe/Cycbot.BP |
AV | Rising | Trojan.Win32.Generic.133729E1 |
AV | Rising | Trojan.Win32.Generic.133729E1 |
AV | Sophos | Mal/FakeAV-IS |
AV | Sophos | Mal/FakeAV-IS |
AV | Symantec | Backdoor.Cycbot!gen3 |
AV | Symantec | Backdoor.Cycbot!gen3 |
AV | Trend Micro | BKDR_CYCBOT.SMX |
AV | Trend Micro | BKDR_CYCBOT.SMX |
AV | VirusBlokAda (vba32) | Backdoor.Gbot |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Registry | HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝ 1 |
---|---|
Registry | HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝ C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe |
Creates File | C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat |
Creates File | C:\Documents and Settings\Administrator\Cookies\index.dat |
Creates File | PIPE\lsarpc |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe |
Creates File | C:\Documents and Settings\Administrator\Application Data\75DE.FFC |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat |
Creates Process | C:\Documents and Settings\Administrator\Application Data\dwm.exe |
Creates Process | C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft |
Creates Process | C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data |
Creates Mutex | {4D92BB9F-9A66-458f-ACA4-66172A7016D4} |
Creates Mutex | WininetConnectionMutex |
Creates Mutex | c:!documents and settings!administrator!cookies! |
Creates Mutex | {61B98B86-5F44-42b3-BCA1-33904B067B81} |
Creates Mutex | {EEEB680D-AE62-4375-B93E-E9AE5FF585C1} |
Creates Mutex | c:!documents and settings!administrator!local settings!history!history.ie5! |
Creates Mutex | {B37C48AF-B05C-4520-8B38-2FE181D5DC78} |
Creates Mutex | c:!documents and settings!administrator!local settings!temporary internet files!content.ie5! |
Winsock DNS | 127.0.0.1 |
Winsock DNS | searchmobilecode.com |
Winsock DNS | psfk.com |
Winsock DNS | extremerollerclub.com |
Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Process | C:\Documents and Settings\Administrator\Application Data\dwm.exe |
---|
Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates Process | C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe |
---|
Process
↳ C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Network Details:
DNS | psfk.com Type: A 72.10.50.52 |
---|---|
DNS | zonetf.com Type: A 208.73.211.175 |
DNS | zonetf.com Type: A 208.73.211.168 |
DNS | zonetf.com Type: A 208.73.211.165 |
DNS | zonetf.com Type: A 208.73.210.218 |
DNS | zonetf.com Type: A 208.73.210.215 |
DNS | zonetf.com Type: A 208.73.210.215 |
DNS | zonetf.com Type: A 208.73.211.175 |
DNS | zonetf.com Type: A 208.73.211.168 |
DNS | zonetf.com Type: A 208.73.211.165 |
DNS | zonetf.com Type: A 208.73.210.218 |
DNS | searchmobilecode.com Type: A |
DNS | extremerollerclub.com Type: A |
HTTP GET | http://psfk.com/img/icons/twitter.png?v10=15&tq=gJ4WK%2FSUh7TFkUR8oY%2BQtMWTUj26kJH7yZRWK%2B%2FbxWq1SfkIYUBM User-Agent: mozilla/2.0 |
HTTP POST | http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88BSr%2Fe%2BV5ZuRg%3D%3D User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
HTTP POST | http://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNoX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh8sG%2BcoJsX%2BSNxlKv975Xlm5G User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Flows TCP | 192.168.1.1:1031 ➝ 72.10.50.52:80 |
Flows TCP | 192.168.1.1:1033 ➝ 208.73.211.175:80 |
Flows TCP | 192.168.1.1:1034 ➝ 208.73.210.215:80 |
Raw Pcap
0x00000000 (00000) 47455420 2f696d67 2f69636f 6e732f74 GET /img/icons/t 0x00000010 (00016) 77697474 65722e70 6e673f76 31303d31 witter.png?v10=1 0x00000020 (00032) 35267471 3d674a34 574b2532 46535568 5&tq=gJ4WK%2FSUh 0x00000030 (00048) 3754466b 5552386f 59253242 51744d57 7TFkUR8oY%2BQtMW 0x00000040 (00064) 54556a32 366b4a48 37795a52 574b2532 TUj26kJH7yZRWK%2 0x00000050 (00080) 42253246 62785771 3153666b 49595542 B%2FbxWq1SfkIYUB 0x00000060 (00096) 4d204854 54502f31 2e300d0a 436f6e6e M HTTP/1.0..Conn 0x00000070 (00112) 65637469 6f6e3a20 636c6f73 650d0a48 ection: close..H 0x00000080 (00128) 6f73743a 20707366 6b2e636f 6d0d0a41 ost: psfk.com..A 0x00000090 (00144) 63636570 743a202a 2f2a0d0a 55736572 ccept: */*..User 0x000000a0 (00160) 2d416765 6e743a20 6d6f7a69 6c6c612f -Agent: mozilla/ 0x000000b0 (00176) 322e300d 0a0d0a 2.0.... 0x00000000 (00000) 504f5354 202f696e 6465782e 68746d6c POST /index.html 0x00000010 (00016) 3f74713d 674b5930 73486f4c 374c2532 ?tq=gKY0sHoL7L%2 0x00000020 (00032) 424e3679 4c68627a 36323773 48644d66 BN6yLhbz627sHdMf 0x00000030 (00048) 4e6f5825 32425039 68253242 49307344 NoX%2BP9h%2BI0sD 0x00000040 (00064) 6b583950 69777257 4c324755 72302532 kX9PiwrWL2GUr0%2 0x00000050 (00080) 42624770 66765273 58253242 61497762 BbGpfvRsX%2BaIwb 0x00000060 (00096) 35316757 31663434 37477258 66306555 51gW1f447GrXf0eU 0x00000070 (00112) 32532532 4273536f 644f4675 544c6976 2S%2BsSodOFuTLiv 0x00000080 (00128) 30616744 68327850 36504c45 71776143 0agDh2xP6PLEqwaC 0x00000090 (00144) 476b726c 25324637 4c644250 4e705070 Gkrl%2F7LdBPNpPp 0x000000a0 (00160) 54757871 30307344 304f704c 6a527141 Tuxq00sD0OpLjRqA 0x000000b0 (00176) 4f684c67 6a683838 42537225 32466525 OhLgjh88BSr%2Fe% 0x000000c0 (00192) 32425635 5a755267 25334425 33442048 2BV5ZuRg%3D%3D H 0x000000d0 (00208) 5454502f 312e310d 0a486f73 743a207a TTP/1.1..Host: z 0x000000e0 (00224) 6f6e6574 662e636f 6d0d0a55 7365722d onetf.com..User- 0x000000f0 (00240) 4167656e 743a204d 6f7a696c 6c612f34 Agent: Mozilla/4 0x00000100 (00256) 2e302028 636f6d70 61746962 6c653b20 .0 (compatible; 0x00000110 (00272) 4d534945 20362e30 3b205769 6e646f77 MSIE 6.0; Window 0x00000120 (00288) 73204e54 20352e31 290d0a43 6f6e7465 s NT 5.1)..Conte 0x00000130 (00304) 6e742d4c 656e6774 683a2030 0d0a436f nt-Length: 0..Co 0x00000140 (00320) 6e6e6563 74696f6e 3a20636c 6f73650d nnection: close. 0x00000150 (00336) 0a0d0a ... 0x00000000 (00000) 504f5354 202f696e 6465782e 68746d6c POST /index.html 0x00000010 (00016) 3f74713d 674b5930 73486f4c 374c2532 ?tq=gKY0sHoL7L%2 0x00000020 (00032) 424e3679 4c68627a 36323773 48644d66 BN6yLhbz627sHdMf 0x00000030 (00048) 4e6f5825 32425039 68253242 49307344 NoX%2BP9h%2BI0sD 0x00000040 (00064) 6b583950 69777257 4c324755 72302532 kX9PiwrWL2GUr0%2 0x00000050 (00080) 42624770 66765273 58253242 61497762 BbGpfvRsX%2BaIwb 0x00000060 (00096) 35316757 31663434 37477258 66306555 51gW1f447GrXf0eU 0x00000070 (00112) 32532532 4273536f 644f4675 544c6976 2S%2BsSodOFuTLiv 0x00000080 (00128) 30616744 68327850 36504c45 71776143 0agDh2xP6PLEqwaC 0x00000090 (00144) 476b726c 25324637 4c644250 4e705070 Gkrl%2F7LdBPNpPp 0x000000a0 (00160) 54757871 30307344 304f704c 6a527141 Tuxq00sD0OpLjRqA 0x000000b0 (00176) 4f684c67 6a683873 47253242 636f4a73 OhLgjh8sG%2BcoJs 0x000000c0 (00192) 58253242 534e786c 4b763937 35586c6d X%2BSNxlKv975Xlm 0x000000d0 (00208) 35472048 5454502f 312e310d 0a486f73 5G HTTP/1.1..Hos 0x000000e0 (00224) 743a207a 6f6e6574 662e636f 6d0d0a55 t: zonetf.com..U 0x000000f0 (00240) 7365722d 4167656e 743a204d 6f7a696c ser-Agent: Mozil 0x00000100 (00256) 6c612f34 2e302028 636f6d70 61746962 la/4.0 (compatib 0x00000110 (00272) 6c653b20 4d534945 20362e30 3b205769 le; MSIE 6.0; Wi 0x00000120 (00288) 6e646f77 73204e54 20352e31 290d0a43 ndows NT 5.1)..C 0x00000130 (00304) 6f6e7465 6e742d4c 656e6774 683a2030 ontent-Length: 0 0x00000140 (00320) 0d0a436f 6e6e6563 74696f6e 3a20636c ..Connection: cl 0x00000150 (00336) 6f73650d 0a0d0a ose....
Strings
..^V...umA.e....u...XI .cW...;.DV. |m.....:...... . ..p.6.w^ .. C.o . .....8>...(c-LBJ. w..0. p.|ml .. . ; *. . . 040904b0 1.0.0.3 1649 2E%A Ad"B A fC a#g' bQ3@ ! eQASS FileVersion jjjjjj $`p@ PrivateBuild ProductVersion QScG 'RsF S$$ S#00 &se' StringFileInfo TIMES NEW ROMAN Translation U1$ VarFileInfo VS_VERSION_INFO -^.)-- 0)b{pS 0eAJ"v :0XwQO4USp 1OLHUB 4[Uo w `5-[2L- 655:]OF_]# .}\=.7 7h(Z*I\q /7J=9` '~7]sC7 8m`VZ! ;93V'> A8F8uh+ a=KSkd + ~aSI) A~XVJdz] B>b|sr ca,Vn9 cD9x' c*fw^u( C! g{B CharNextW CharUpperW CheckRemoteDebuggerPresent C/M,yZ Cn{_Hu CoCreateInstance CoInitialize CoRegisterClassObject CoRevokeClassObject CoTaskMemAlloc CoTaskMemFree CoTaskMemRealloc CoUninitialize CreateStdAccessibleObject /<cy2j @.data DeleteCriticalSection D|Gp;~ DispatchMessageW ` d-M'` ]dONKO E4GO%R EnumResourceTypesA EoHN{j f2.JFx ]FG}q FindClose fLu) @e+< fUo|yul G0zdTq GetACP GetCPInfo GetLastError GetMessageW GetModuleHandleW GetTickCount GlobalAlloc GlobalFree %#G!"O h1HjN4W HC C<* hct-^d h_L~.D H*m8IDUS )>hN%? I6^\JV_ I_E`?* InitializeCriticalSection -I qE[6 .isete ~,|IUa ^]j{6n <J,+}i Jk7Toa jSk#["+` KERNEL32.dll KillTimer K# ^uy l\7-?] L@g:El LockResource l!q8nr LresultFromObject lstrcmpiW lstrcpyA lstrcpyW lstrlenW lWfB;, L$xFMd ^Mc9td>> MqBK;uu ;`~MRJ MultiByteToWideChar N3G ]O N/.83Y N @8Tz- N(dV&{s }n[F9s "Nk:*& %N%R[2r+ ny`oU?t OiTG(u ole32.dll OLEACC.dll \(oN9r O/rj%< OutputDebugStringW `~o/wm ]!p5(z PathCombineW PathFileExistsW @pG?XP!. Pj{i@g PostThreadMessageW >~}PR{ q8HEU1 `.rdata Rj9WD3Z RL08|@-jF ;<{rzw SendMessageW SetTimer "sFAm0 SHLWAPI.dll Soew0>Q StringFromCLSID StringFromGUID2 !This program cannot be run in DOS mode. T Imh=m^ TOj].z{ TranslateMessage \tUH,! /U5JUA= u'Cy9- }+ueyd87 UnregisterClassA upF#>v_ USER32.dll utTPW+ [uxi-(U<& v@f&-# vK#;L}\ ,vUTXh v\[wO3 Wb|31fd WideCharToMultiByte wm>%}G wsprintfW Wuj%# W`z>p0 x2 r4cR =_[X42 x8V!Bc[U xB&:@u X(]J]tG (y8?s \"'y]a8| ycF{dV YG<`BW $YmFomo yP/-#nV &|Yz0w Z=?*fQ +Z"hr] zR3T6p ZwP)fqW ZXo6.5l4 z& \zt