Analysis Date2015-08-11 20:43:01
MD539b352eacd165010c6e53c91790d54d5
SHA1c90b0311b54d0a7d5aa75ed9c47ea0492fc47b70

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 0912ec61a0a7475787c7f557e2507be5 sha1: ae9e471cdbc7a0f0a52fd87b0d4cc389a96a3690 size: 197120
Section.rdata md5: 3c50f7be21c77785773797cd44a4c489 sha1: 61c91e717db8216a6573690869bee93a59befd93 size: 51200
Section.data md5: d0f54f0c09d0fbaf00508b5846d5ed36 sha1: 02708a5088a69e2a9cc56deebec5183440ded634 size: 7168
Section.reloc md5: 0eb2d24848dd39bf3633d43fa0aa85f2 sha1: f5a726eebf57e82474eea34415931f4c00858ea1 size: 14336
Timestamp2015-04-29 18:52:44
PackerMicrosoft Visual C++ 8
PEhashaecb151bd10dbd9b3de03bef8cc738dcdb448dda
IMPhashaa7fde7fb834263c318c5b3b62d61d37
AVK7Trojan ( 004c12491 )
AVAuthentiumW32/Scar.R.gen!Eldorado
AVBullGuardGen:Variant.Kazy.604861
AVIkarusTrojan.Win32.Bayrob
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVClamAVno_virus
AVMcafeeTrojan-FGIJ!39B352EACD16
AVDr. WebTrojan.Bayrob.1
AVEmsisoftGen:Variant.Kazy.604861
AVBitDefenderGen:Variant.Kazy.604861
AVAvira (antivir)TR/Crypt.Xpack.195557
AVSymantecDownloader.Upatre!g15
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AF
AVMicroWorld (escan)Gen:Variant.Kazy.604861
AVFortinetW32/Generic.AC.215362
AVGrisoft (avg)Win32/Cryptor
AVAd-AwareGen:Variant.Kazy.604861
AVCA (E-Trust Ino)no_virus
AVMalwareBytesTrojan.Agent.KVTGen
AVEset (nod32)Win32/Bayrob.Q
AVTwisterTrojan.0000E9000000006A1.mg
AVTrend MicroTROJ_BAYROB.SM0
AVRisingTrojan.Win32.Bayrod.a
AVFrisk (f-prot)no_virus
AVArcabit (arcavir)Gen:Variant.Kazy.604861
AVF-SecureGen:Variant.Kazy.604861
AVPadvishno_virus
AVZillya!no_virus
AVVirusBlokAda (vba32)Trojan.Scar
AVKasperskyTrojan.Win32.Generic
AVCAT (quickheal)TrojanSpy.Nivdort.OD4

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\voimeoudh\btkp6qdxk9xy
Creates FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Creates FileC:\voimeoudh\jf1lg5mjbgqwjk.exe
Deletes FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Creates ProcessC:\voimeoudh\jf1lg5mjbgqwjk.exe

Process
↳ C:\voimeoudh\jf1lg5mjbgqwjk.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Update Process SPP Services PNRP BranchCache ➝
C:\voimeoudh\tekxkjq.exe
Creates FileC:\voimeoudh\btkp6qdxk9xy
Creates FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Creates FileC:\voimeoudh\lppekp
Creates FilePIPE\lsarpc
Creates FileC:\voimeoudh\tekxkjq.exe
Deletes FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Creates ProcessC:\voimeoudh\tekxkjq.exe
Creates ServiceCall Application Color Redirector - C:\voimeoudh\tekxkjq.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 808

Process
↳ Pid 856

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1212

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1876

Process
↳ Pid 1144

Process
↳ C:\voimeoudh\tekxkjq.exe

Creates FileC:\voimeoudh\qemvp9iv9
Creates FileC:\voimeoudh\btkp6qdxk9xy
Creates FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Creates Filepipe\net\NtControlPipe10
Creates FileC:\voimeoudh\lppekp
Creates File\Device\Afd\Endpoint
Creates FileC:\voimeoudh\xxjnvjrklzwd.exe
Deletes FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Creates Processhqvslzihfyye "c:\voimeoudh\tekxkjq.exe"

Process
↳ C:\voimeoudh\tekxkjq.exe

Creates FileC:\voimeoudh\btkp6qdxk9xy
Creates FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Deletes FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy

Process
↳ hqvslzihfyye "c:\voimeoudh\tekxkjq.exe"

Creates FileC:\voimeoudh\btkp6qdxk9xy
Creates FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy
Deletes FileC:\WINDOWS\voimeoudh\btkp6qdxk9xy

Network Details:

DNSdoctortraining.net
Type: A
184.168.221.34
DNSdoctorstorm.net
Type: A
72.21.91.60
DNSresultstorm.net
Type: A
98.139.135.129
DNSdesirestorm.net
Type: A
195.22.26.252
DNSdesirestorm.net
Type: A
195.22.26.253
DNSdesirestorm.net
Type: A
195.22.26.254
DNSdesirestorm.net
Type: A
195.22.26.231
DNSstrengthtraining.net
Type: A
165.160.15.20
DNSstrengthtraining.net
Type: A
165.160.13.20
DNSstrengthstorm.net
Type: A
50.63.202.27
DNSmightthrown.net
Type: A
DNSdoctorhunger.net
Type: A
DNSprettyhunger.net
Type: A
DNSprettytraining.net
Type: A
DNSprettystorm.net
Type: A
DNSdoctorthrown.net
Type: A
DNSprettythrown.net
Type: A
DNSfellowhunger.net
Type: A
DNSdoublehunger.net
Type: A
DNSfellowtraining.net
Type: A
DNSdoubletraining.net
Type: A
DNSfellowstorm.net
Type: A
DNSdoublestorm.net
Type: A
DNSfellowthrown.net
Type: A
DNSdoublethrown.net
Type: A
DNSbrokenhunger.net
Type: A
DNSresulthunger.net
Type: A
DNSbrokentraining.net
Type: A
DNSresulttraining.net
Type: A
DNSbrokenstorm.net
Type: A
DNSbrokenthrown.net
Type: A
DNSresultthrown.net
Type: A
DNSpreparehunger.net
Type: A
DNSdesirehunger.net
Type: A
DNSpreparetraining.net
Type: A
DNSdesiretraining.net
Type: A
DNSpreparestorm.net
Type: A
DNSpreparethrown.net
Type: A
DNSdesirethrown.net
Type: A
DNSstrengthhunger.net
Type: A
DNSstillhunger.net
Type: A
DNSstilltraining.net
Type: A
DNSstillstorm.net
Type: A
DNSstrengththrown.net
Type: A
DNSstillthrown.net
Type: A
DNSmovementchoose.net
Type: A
DNSoutsidechoose.net
Type: A
DNSmovementalthough.net
Type: A
DNSoutsidealthough.net
Type: A
DNSmovementperiod.net
Type: A
DNSoutsideperiod.net
Type: A
DNSmovementhowever.net
Type: A
DNSoutsidehowever.net
Type: A
DNSbuildingchoose.net
Type: A
DNSeveningchoose.net
Type: A
DNSbuildingalthough.net
Type: A
DNSeveningalthough.net
Type: A
DNSbuildingperiod.net
Type: A
DNSeveningperiod.net
Type: A
DNSbuildinghowever.net
Type: A
DNSeveninghowever.net
Type: A
DNSstorechoose.net
Type: A
DNSmightchoose.net
Type: A
DNSstorealthough.net
Type: A
DNSmightalthough.net
Type: A
DNSstoreperiod.net
Type: A
DNSmightperiod.net
Type: A
DNSstorehowever.net
Type: A
DNSmighthowever.net
Type: A
DNSdoctorchoose.net
Type: A
DNSprettychoose.net
Type: A
DNSdoctoralthough.net
Type: A
DNSprettyalthough.net
Type: A
DNSdoctorperiod.net
Type: A
DNSprettyperiod.net
Type: A
DNSdoctorhowever.net
Type: A
DNSprettyhowever.net
Type: A
DNSfellowchoose.net
Type: A
DNSdoublechoose.net
Type: A
DNSfellowalthough.net
Type: A
DNSdoublealthough.net
Type: A
DNSfellowperiod.net
Type: A
DNSdoubleperiod.net
Type: A
DNSfellowhowever.net
Type: A
DNSdoublehowever.net
Type: A
DNSbrokenchoose.net
Type: A
DNSresultchoose.net
Type: A
DNSbrokenalthough.net
Type: A
DNSresultalthough.net
Type: A
HTTP GEThttp://doctortraining.net/index.php
User-Agent:
HTTP GEThttp://doctorstorm.net/index.php
User-Agent:
HTTP GEThttp://resultstorm.net/index.php
User-Agent:
HTTP GEThttp://desirestorm.net/index.php
User-Agent:
HTTP GEThttp://strengthtraining.net/index.php
User-Agent:
HTTP GEThttp://strengthstorm.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.34:80
Flows TCP192.168.1.1:1032 ➝ 72.21.91.60:80
Flows TCP192.168.1.1:1033 ➝ 98.139.135.129:80
Flows TCP192.168.1.1:1034 ➝ 195.22.26.252:80
Flows TCP192.168.1.1:1035 ➝ 165.160.15.20:80
Flows TCP192.168.1.1:1036 ➝ 50.63.202.27:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   6f63746f 72747261 696e696e 672e6e65   octortraining.ne
0x00000050 (00080)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   6f63746f 7273746f 726d2e6e 65740d0a   octorstorm.net..
0x00000050 (00080)   0d0a0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2072   : close..Host: r
0x00000040 (00064)   6573756c 7473746f 726d2e6e 65740d0a   esultstorm.net..
0x00000050 (00080)   0d0a0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2064   : close..Host: d
0x00000040 (00064)   65736972 6573746f 726d2e6e 65740d0a   esirestorm.net..
0x00000050 (00080)   0d0a0a0d 0a                           .....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   7472656e 67746874 7261696e 696e672e   trengthtraining.
0x00000050 (00080)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000040 (00064)   7472656e 67746873 746f726d 2e6e6574   trengthstorm.net
0x00000050 (00080)   0d0a0d0a 0a0d0a                       .......


Strings