Analysis Date2016-02-05 04:55:11
MD57c07bcdea7d818d0cb51130c7b63aeb7
SHA1a6ac3ec5d215f8abe8e0441131380b6b94f502c9

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 7912d0ffc639a37d78e87aa353da8b2d sha1: 8245372a73e4feeb970b3c05fb093b8fcc06b3ab size: 27648
Section.rdata md5: 5bd0480bf548755de12a484b1b85c19c sha1: 584c2f28db3b0a0117ef6e6a0e61ab031f4d0c3e size: 13312
Section.data md5: 94bbfa39c038c3dc3d294a2aa13d73fa sha1: 2ed710212ff35ba9bdc7721c0eda4abbb9cd28ce size: 4096
Section.rsrc md5: 24ce632e79376715bd92cc1badf6b6e7 sha1: 41da32059221ee60b68b59f355ec3229e6084482 size: 19456
Section.reloc md5: de5e19481ce2143082fae464b7a6d6e7 sha1: 027ab17ef28f6da54d16da456a3457543432ba6f size: 4608
Timestamp2014-02-18 19:57:27
PackerMicrosoft Visual C++ 8
PEhash57c805462519a933fa98ef66e0909f9f0928b801
IMPhash9f4c6542128fba942a3b092c3a5337cf
AVTrend MicroTROJ_UPATRE.SMR3
AVFortinetW32/Kryptik.DQAA!tr
AVTwisterNo Virus
AVDr. WebTrojan.Upatre.5347
AVArcabit (arcavir)Trojan.GenericKD.2551012
AVClamAVNo Virus
AVCA (E-Trust Ino)No Virus
AVMicroWorld (escan)Trojan.GenericKD.2551012
AVIkarusTrojan.Win32.Crypt
AVBitDefenderTrojan.GenericKD.2551012
AVGrisoft (avg)Crypt4.BJPS
AVFrisk (f-prot)W32/Upatre.BP.gen!Eldorado
AVEset (nod32)Win32/Kryptik.DPGO
AVAlwil (avast)Win32:Malware-gen
AVMalwareBytesTrojan.Upatre
AVAd-AwareTrojan.GenericKD.2551012
AVBullGuardTrojan.GenericKD.2551012
AVKasperskyTrojan.Win32.Generic
AVCAT (quickheal)Trojan.Kadena.B4
AVAvira (antivir)TR/Dldr.Upatre.MU
AVAuthentiumW32/Upatre.BP.gen!Eldorado
AVRisingNo Virus
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre!rfn
AVZillya!Downloader.Upatre.Win32.43187
AVK7Riskware ( 0040eff71 )
AVMcafeeUpatre-FACH!7C07BCDEA7D8
AVF-SecureTrojan.GenericKD.2551012
AVVirusBlokAda (vba32)No Virus
AVSymantecDownloader.Upatre!gen5
AVEmsisoftTrojan.GenericKD.2551012

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\vadftol.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\vadftol.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\vadftol.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Deletes FileC:\malware.exe
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS94.154.107.172
Winsock DNS188.255.243.105
Winsock DNS194.106.166.22
Winsock DNS64.111.36.52
Winsock DNS188.255.236.184
Winsock DNS178.222.250.35
Winsock DNS68.119.5.32
Winsock DNS38.65.142.12
Winsock DNSicanhazip.com

Network Details:

DNSicanhazip.com
Type: A
104.238.162.182
DNSicanhazip.com
Type: A
45.32.200.23
HTTP GEThttp://icanhazip.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
HTTP GEThttp://38.65.142.12:12556/KK22/COMPUTER-XXXXXX/0/51-SP3/0/
User-Agent: Mozilla/5.0 (Windows NT 6.1;WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36 OPR/28.0.1750.48
Flows TCP192.168.1.1:1031 ➝ 104.238.162.182:80
Flows TCP192.168.1.1:1032 ➝ 38.65.142.12:12556
Flows TCP192.168.1.1:1033 ➝ 64.111.36.52:443
Flows TCP192.168.1.1:1034 ➝ 64.111.36.52:443
Flows TCP192.168.1.1:1035 ➝ 64.111.36.52:443
Flows TCP192.168.1.1:1036 ➝ 64.111.36.52:443
Flows TCP192.168.1.1:1037 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1038 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1039 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1040 ➝ 178.222.250.35:443
Flows TCP192.168.1.1:1041 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1042 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1043 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1044 ➝ 94.154.107.172:443
Flows TCP192.168.1.1:1045 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1046 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1047 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1048 ➝ 68.119.5.32:443
Flows TCP192.168.1.1:1049 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1050 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1051 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1052 ➝ 194.106.166.22:443
Flows TCP192.168.1.1:1053 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1054 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1055 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1056 ➝ 188.255.243.105:443
Flows TCP192.168.1.1:1057 ➝ 188.255.236.184:443
Flows TCP192.168.1.1:1058 ➝ 188.255.236.184:443

Raw Pcap
0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   41636365 70743a20 74657874 2f2a2c20   Accept: text/*, 
0x00000020 (00032)   6170706c 69636174 696f6e2f 2a0d0a55   application/*..U
0x00000030 (00048)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000040 (00064)   6c612f35 2e302028 57696e64 6f777320   la/5.0 (Windows 
0x00000050 (00080)   4e542036 2e313b57 4f573634 29204170   NT 6.1;WOW64) Ap
0x00000060 (00096)   706c6557 65624b69 742f3533 372e3336   pleWebKit/537.36
0x00000070 (00112)   20284b48 544d4c2c 206c696b 65204765    (KHTML, like Ge
0x00000080 (00128)   636b6f29 20436872 6f6d652f 34312e30   cko) Chrome/41.0
0x00000090 (00144)   2e323237 322e3839 20536166 6172692f   .2272.89 Safari/
0x000000a0 (00160)   3533372e 3336204f 50522f32 382e302e   537.36 OPR/28.0.
0x000000b0 (00176)   31373530 2e34380d 0a486f73 743a2069   1750.48..Host: i
0x000000c0 (00192)   63616e68 617a6970 2e636f6d 0d0a4361   canhazip.com..Ca
0x000000d0 (00208)   6368652d 436f6e74 726f6c3a 206e6f2d   che-Control: no-
0x000000e0 (00224)   63616368 650d0a0d 0a                  cache....

0x00000000 (00000)   47455420 2f4b4b32 322f434f 4d505554   GET /KK22/COMPUT
0x00000010 (00016)   45522d58 58585858 582f302f 35312d53   ER-XXXXXX/0/51-S
0x00000020 (00032)   50332f30 2f204854 54502f31 2e310d0a   P3/0/ HTTP/1.1..
0x00000030 (00048)   55736572 2d416765 6e743a20 4d6f7a69   User-Agent: Mozi
0x00000040 (00064)   6c6c612f 352e3020 2857696e 646f7773   lla/5.0 (Windows
0x00000050 (00080)   204e5420 362e313b 574f5736 34292041    NT 6.1;WOW64) A
0x00000060 (00096)   70706c65 5765624b 69742f35 33372e33   ppleWebKit/537.3
0x00000070 (00112)   3620284b 48544d4c 2c206c69 6b652047   6 (KHTML, like G
0x00000080 (00128)   65636b6f 29204368 726f6d65 2f34312e   ecko) Chrome/41.
0x00000090 (00144)   302e3232 37322e38 39205361 66617269   0.2272.89 Safari
0x000000a0 (00160)   2f353337 2e333620 4f50522f 32382e30   /537.36 OPR/28.0
0x000000b0 (00176)   2e313735 302e3438 0d0a486f 73743a20   .1750.48..Host: 
0x000000c0 (00192)   33382e36 352e3134 322e3132 3a313235   38.65.142.12:125
0x000000d0 (00208)   35360d0a 43616368 652d436f 6e74726f   56..Cache-Contro
0x000000e0 (00224)   6c3a206e 6f2d6361 6368650d 0a0d0a     l: no-cache....

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.


Strings