Analysis Date2016-02-01 01:33:47
MD59c1a33d245e788367ac3f23e104f3140
SHA1a98a87b8dad5b50465d32a16d0247cd5b7aa8beb

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 3e0e27d0d98cc0704b9e9b6f3e72de5a sha1: 3cf6e861c225dd063ca2db13976366b622a4520e size: 12288
Section.data md5: e4c39474323eae44eec13661684ea276 sha1: 72b88f5d47fb7b313bbfe0bd5f948cc9f031ada1 size: 512
Section.rsrc md5: 28760e31b828881fb1cff2042456ee6e sha1: 75c3a0cddb770a7a30a1fd7b7b6a44e83e8ce716 size: 20480
Timestamp2014-07-22 23:07:28
VersionLegalCopyright:
InternalName:
FileVersion: 1.1.2.17
CompanyName: GOOTEK
LegalTrademarks:
ProductName: GOOTEK
ProductVersion: 2.17
FileDescription: GOOTEK
OriginalFilename:
PackerMicrosoft Visual C++ v6.0
PEhasha422233f4d25b03d97b0c734db956f4be794233d
IMPhashbde0195bb7d98c1a7a65e76bc001f0f2
AVCA (E-Trust Ino)No Virus
AVRisingNo Virus
AVMcafeeUpatre-FACH!9C1A33D245E7
AVAvira (antivir)TR/Yarwi.cjamnc
AVTwisterTrojan.Girtk.DREE.wcsa
AVAd-AwareTrojan.Generic.15747291
AVAlwil (avast)Crypt-SDL [Trj]
AVEset (nod32)Win32/Kryptik.DREE
AVGrisoft (avg)Agent
AVSymantecDownloader.Upatre!gen5
AVFortinetW64/Kryptik.DRAJ!tr
AVBitDefenderTrojan.Generic.15747291
AVK7Trojan ( 004c941a1 )
AVMicrosoft Security EssentialsTrojanDownloader:Win32/Upatre!rfn
AVMicroWorld (escan)Trojan.Upatre.Gen.3
AVMalwareBytesTrojan.Upatre
AVAuthentiumW32/Upatre.CG.gen!Eldorado
AVEmsisoftTrojan.Generic.15747291
AVFrisk (f-prot)No Virus
AVIkarusTrojan.Win32.Crypt
AVZillya!Downloader.Upatre.Win32.53887
AVKasperskyTrojan-Downloader.Win32.Upatre.dysi
AVTrend MicroTROJ_UPATRE.SM37
AVVirusBlokAda (vba32)TrojanDownloader.Upatre
AVCAT (quickheal)Trojan.Kadena.B4
AVBullGuardTrojan.Generic.15747291
AVArcabit (arcavir)Trojan.Generic.15747291
AVClamAVWin.Trojan.Upatre-6075
AVDr. WebTrojan.DownLoader16.7360
AVF-SecureTrojan.Generic.15747291

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\ulysats.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\ulysats.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\ulysats.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\checkip.dyndns[1].htm
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS87.249.142.189
Winsock DNS81.90.175.7
Winsock DNS76.84.81.120
Winsock DNS217.168.210.122
Winsock DNS68.70.242.203
Winsock DNS84.246.161.47
Winsock DNS85.135.104.170
Winsock DNScheckip.dyndns.org

Network Details:

DNScheckip.dyndns.com
Type: A
216.146.38.70
DNScheckip.dyndns.com
Type: A
216.146.43.70
DNScheckip.dyndns.com
Type: A
91.198.22.70
DNScheckip.dyndns.org
Type: A
HTTP GEThttp://checkip.dyndns.org/
User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.36 (KHTML, like Gecko) Chrome/44.0.2455.81 Safari/535.36
Flows TCP192.168.1.1:1031 ➝ 216.146.38.70:80
Flows TCP192.168.1.1:1032 ➝ 87.249.142.189:443
Flows TCP192.168.1.1:1033 ➝ 87.249.142.189:443
Flows TCP192.168.1.1:1034 ➝ 87.249.142.189:443
Flows TCP192.168.1.1:1035 ➝ 87.249.142.189:443
Flows TCP192.168.1.1:1036 ➝ 85.135.104.170:443
Flows TCP192.168.1.1:1037 ➝ 85.135.104.170:443
Flows TCP192.168.1.1:1038 ➝ 85.135.104.170:443
Flows TCP192.168.1.1:1039 ➝ 85.135.104.170:443
Flows TCP192.168.1.1:1040 ➝ 76.84.81.120:443
Flows TCP192.168.1.1:1041 ➝ 76.84.81.120:443
Flows TCP192.168.1.1:1042 ➝ 76.84.81.120:443
Flows TCP192.168.1.1:1043 ➝ 76.84.81.120:443
Flows TCP192.168.1.1:1044 ➝ 84.246.161.47:443
Flows TCP192.168.1.1:1045 ➝ 84.246.161.47:443
Flows TCP192.168.1.1:1046 ➝ 84.246.161.47:443
Flows TCP192.168.1.1:1047 ➝ 84.246.161.47:443
Flows TCP192.168.1.1:1048 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1049 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1050 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1051 ➝ 217.168.210.122:443
Flows TCP192.168.1.1:1052 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1053 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1054 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1055 ➝ 81.90.175.7:443
Flows TCP192.168.1.1:1056 ➝ 68.70.242.203:443
Flows TCP192.168.1.1:1057 ➝ 68.70.242.203:443

Raw Pcap
0x00000000 (00000)   47455420 2f204854 54502f31 2e310d0a   GET / HTTP/1.1..
0x00000010 (00016)   41636365 70743a20 74657874 2f2a2c20   Accept: text/*, 
0x00000020 (00032)   6170706c 69636174 696f6e2f 2a0d0a55   application/*..U
0x00000030 (00048)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000040 (00064)   6c612f35 2e302028 57696e64 6f777320   la/5.0 (Windows 
0x00000050 (00080)   4e542036 2e312920 4170706c 65576562   NT 6.1) AppleWeb
0x00000060 (00096)   4b69742f 3533352e 33362028 4b48544d   Kit/535.36 (KHTM
0x00000070 (00112)   4c2c206c 696b6520 4765636b 6f292043   L, like Gecko) C
0x00000080 (00128)   68726f6d 652f3434 2e302e32 3435352e   hrome/44.0.2455.
0x00000090 (00144)   38312053 61666172 692f3533 352e3336   81 Safari/535.36
0x000000a0 (00160)   0d0a486f 73743a20 63686563 6b69702e   ..Host: checkip.
0x000000b0 (00176)   64796e64 6e732e6f 72670d0a 43616368   dyndns.org..Cach
0x000000c0 (00192)   652d436f 6e74726f 6c3a206e 6f2d6361   e-Control: no-ca
0x000000d0 (00208)   6368650d 0a0d0a                       che....

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.

0x00000000 (00000)   804c0103                              .L..

0x00000000 (00000)   802b01                                .+.


Strings