Analysis Date2015-07-30 22:58:30
MD5f5a4132dc6ccfcd58e36256889eaeed2
SHA1d44ecf703bdfccf81309b983e95e2165fdf1f0b0

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 90599c67e3307716e6be5786d5487519 sha1: 23fe9c91f86ebb3f7fad71972ee901f65ab43513 size: 315392
Section.rdata md5: e7d59bb1d54fa7b04e1d46fb77cbd0c9 sha1: 2803e4acbad086baf4de50ad2691ed1ecf54bba5 size: 59392
Section.data md5: fed12aceb6f89388fd6301cafb15e504 sha1: f21552e82e303987b029b97ad4ca49742f1b93fb size: 7680
Section.reloc md5: 01e5846e3b158641633de2dd753e3135 sha1: 0c442904461876fe1ad9550b55e0ab6b8b23fd4f size: 25600
Timestamp2015-05-11 06:10:06
PackerMicrosoft Visual C++ 8
PEhasha605deab93b5a71c2db8c593d930b095d4e31c67
IMPhash22a438e28625943e84fd008b9f0d2603
AVRisingTrojan.Win32.Bayrod.b
AVMcafeePWS-FCCE!F5A4132DC6CC
AVAvira (antivir)TR/Spy.ZBot.xbbeomq
AVTwisterTrojan.Scar.jpzm.vyol
AVAd-AwareGen:Variant.Kazy.611009
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVEset (nod32)Win32/Bayrob.W
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Bayrob.T!tr
AVBitDefenderGen:Variant.Kazy.611009
AVK7Trojan ( 004c3a4d1 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.AL
AVMicroWorld (escan)Gen:Variant.Kazy.611009
AVMalwareBytesTrojan.Agent.KVTGen
AVAuthentiumW32/Nivdort.B.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Bayrob
AVEmsisoftGen:Variant.Kazy.611009
AVZillya!Trojan.Bayrob.Win32.1088
AVKasperskyTrojan.Win32.Generic
AVTrend MicroTROJ_BAYROB.SM0
AVCAT (quickheal)TrojanSpy.Nivdort.OD4
AVVirusBlokAda (vba32)Trojan.Scar
AVPadvishno_virus
AVBullGuardGen:Variant.Kazy.611009
AVArcabit (arcavir)Gen:Variant.Kazy.611009
AVCA (E-Trust Ino)no_virus
AVClamAVno_virus
AVDr. WebTrojan.Bayrob.1
AVF-SecureGen:Variant.Kazy.611009

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\cqkoqellesvb\rrzpfvxibg
Creates FileC:\cqkoqellesvb\reo1lcojiliwuvy4.exe
Creates FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Deletes FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Creates ProcessC:\cqkoqellesvb\reo1lcojiliwuvy4.exe

Process
↳ C:\cqkoqellesvb\reo1lcojiliwuvy4.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\IP Debugger Internet Application ➝
C:\cqkoqellesvb\kweltltq.exe
Creates FileC:\cqkoqellesvb\rrzpfvxibg
Creates FileC:\cqkoqellesvb\kweltltq.exe
Creates FilePIPE\lsarpc
Creates FileC:\cqkoqellesvb\gqlgm2rwvzh
Creates FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Deletes FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Creates ProcessC:\cqkoqellesvb\kweltltq.exe
Creates ServiceFont Propagation DCOM Window - C:\cqkoqellesvb\kweltltq.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1860

Process
↳ Pid 1136

Process
↳ C:\cqkoqellesvb\kweltltq.exe

Creates Filepipe\net\NtControlPipe10
Creates FileC:\cqkoqellesvb\rrzpfvxibg
Creates FileC:\cqkoqellesvb\ulqfwycoocw.exe
Creates FileC:\cqkoqellesvb\ftl1lfrc
Creates File\Device\Afd\Endpoint
Creates FileC:\cqkoqellesvb\gqlgm2rwvzh
Creates FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Deletes FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Creates Processifz1yslalvug "c:\cqkoqellesvb\kweltltq.exe"

Process
↳ C:\cqkoqellesvb\kweltltq.exe

Creates FileC:\cqkoqellesvb\rrzpfvxibg
Creates FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Deletes FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg

Process
↳ ifz1yslalvug "c:\cqkoqellesvb\kweltltq.exe"

Creates FileC:\cqkoqellesvb\rrzpfvxibg
Creates FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg
Deletes FileC:\WINDOWS\cqkoqellesvb\rrzpfvxibg

Network Details:

DNSpartyplease.net
Type: A
209.157.71.176
DNSfreshpower.net
Type: A
195.149.84.101
DNSfreshpower.net
Type: A
195.149.84.100
DNScrowdfamous.net
Type: A
95.211.230.75
DNScrowdpower.net
Type: A
162.244.253.60
DNSthoughtpower.net
Type: A
23.229.204.192
DNSwaterpower.net
Type: A
72.52.4.120
DNSwomanpower.net
Type: A
72.52.4.120
DNSpartypower.net
Type: A
66.151.181.49
DNSfightpower.net
Type: A
64.99.80.30
DNSmelbourneit.hotkeysparking.com
Type: A
8.5.1.16
DNSfightcountry.net
Type: A
184.168.221.55
DNSfightplease.net
Type: A
DNSpartycondition.net
Type: A
DNSfightcondition.net
Type: A
DNSfreshcentury.net
Type: A
DNSexperiencecentury.net
Type: A
DNSfreshfamous.net
Type: A
DNSexperiencefamous.net
Type: A
DNSexperiencepower.net
Type: A
DNSfreshcountry.net
Type: A
DNSexperiencecountry.net
Type: A
DNSgentlemancentury.net
Type: A
DNSalreadycentury.net
Type: A
DNSgentlemanfamous.net
Type: A
DNSalreadyfamous.net
Type: A
DNSgentlemanpower.net
Type: A
DNSalreadypower.net
Type: A
DNSgentlemancountry.net
Type: A
DNSalreadycountry.net
Type: A
DNSfollowcentury.net
Type: A
DNSmembercentury.net
Type: A
DNSfollowfamous.net
Type: A
DNSmemberfamous.net
Type: A
DNSfollowpower.net
Type: A
DNSmemberpower.net
Type: A
DNSfollowcountry.net
Type: A
DNSmembercountry.net
Type: A
DNSbegincentury.net
Type: A
DNSknowncentury.net
Type: A
DNSbeginfamous.net
Type: A
DNSknownfamous.net
Type: A
DNSbeginpower.net
Type: A
DNSknownpower.net
Type: A
DNSbegincountry.net
Type: A
DNSknowncountry.net
Type: A
DNSsummercentury.net
Type: A
DNScrowdcentury.net
Type: A
DNSsummerfamous.net
Type: A
DNSsummerpower.net
Type: A
DNSsummercountry.net
Type: A
DNScrowdcountry.net
Type: A
DNSthoughtcentury.net
Type: A
DNSwatercentury.net
Type: A
DNSthoughtfamous.net
Type: A
DNSwaterfamous.net
Type: A
DNSthoughtcountry.net
Type: A
DNSwatercountry.net
Type: A
DNSwomancentury.net
Type: A
DNSsmokecentury.net
Type: A
DNSwomanfamous.net
Type: A
DNSsmokefamous.net
Type: A
DNSsmokepower.net
Type: A
DNSwomancountry.net
Type: A
DNSsmokecountry.net
Type: A
DNSpartycentury.net
Type: A
DNSfightcentury.net
Type: A
DNSpartyfamous.net
Type: A
DNSfightfamous.net
Type: A
DNSpartycountry.net
Type: A
DNSfreshsurprise.net
Type: A
DNSexperiencesurprise.net
Type: A
DNSfreshbeside.net
Type: A
DNSexperiencebeside.net
Type: A
DNSfreshletter.net
Type: A
DNSexperienceletter.net
Type: A
DNSfreshdifferent.net
Type: A
DNSexperiencedifferent.net
Type: A
DNSgentlemansurprise.net
Type: A
DNSalreadysurprise.net
Type: A
DNSgentlemanbeside.net
Type: A
DNSalreadybeside.net
Type: A
DNSgentlemanletter.net
Type: A
DNSalreadyletter.net
Type: A
DNSgentlemandifferent.net
Type: A
DNSalreadydifferent.net
Type: A
DNSfollowsurprise.net
Type: A
HTTP GEThttp://partyplease.net/index.php
User-Agent:
HTTP GEThttp://freshpower.net/index.php
User-Agent:
HTTP GEThttp://crowdfamous.net/index.php
User-Agent:
HTTP GEThttp://crowdpower.net/index.php
User-Agent:
HTTP GEThttp://thoughtpower.net/index.php
User-Agent:
HTTP GEThttp://waterpower.net/index.php
User-Agent:
HTTP GEThttp://womanpower.net/index.php
User-Agent:
HTTP GEThttp://partypower.net/index.php
User-Agent:
HTTP GEThttp://fightpower.net/index.php
User-Agent:
HTTP GEThttp://partycountry.net/index.php
User-Agent:
HTTP GEThttp://fightcountry.net/index.php
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 209.157.71.176:80
Flows TCP192.168.1.1:1032 ➝ 195.149.84.101:80
Flows TCP192.168.1.1:1033 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1034 ➝ 162.244.253.60:80
Flows TCP192.168.1.1:1035 ➝ 23.229.204.192:80
Flows TCP192.168.1.1:1036 ➝ 72.52.4.120:80
Flows TCP192.168.1.1:1037 ➝ 72.52.4.120:80
Flows TCP192.168.1.1:1038 ➝ 66.151.181.49:80
Flows TCP192.168.1.1:1039 ➝ 64.99.80.30:80
Flows TCP192.168.1.1:1040 ➝ 8.5.1.16:80
Flows TCP192.168.1.1:1041 ➝ 184.168.221.55:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   61727479 706c6561 73652e6e 65740d0a   artyplease.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   72657368 706f7765 722e6e65 740d0a0d   reshpower.net...
0x00000050 (00080)   0a0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   726f7764 66616d6f 75732e6e 65740d0a   rowdfamous.net..
0x00000050 (00080)   0d0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2063   : close..Host: c
0x00000040 (00064)   726f7764 706f7765 722e6e65 740d0a0d   rowdpower.net...
0x00000050 (00080)   0a0a                                  ..

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2074   : close..Host: t
0x00000040 (00064)   686f7567 6874706f 7765722e 6e65740d   houghtpower.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   61746572 706f7765 722e6e65 740d0a0d   aterpower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2077   : close..Host: w
0x00000040 (00064)   6f6d616e 706f7765 722e6e65 740d0a0d   omanpower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   61727479 706f7765 722e6e65 740d0a0d   artypower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   69676874 706f7765 722e6e65 740d0a0d   ightpower.net...
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2070   : close..Host: p
0x00000040 (00064)   61727479 636f756e 7472792e 6e65740d   artycountry.net.
0x00000050 (00080)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68702048   GET /index.php H
0x00000010 (00016)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000020 (00032)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000030 (00048)   3a20636c 6f73650d 0a486f73 743a2066   : close..Host: f
0x00000040 (00064)   69676874 636f756e 7472792e 6e65740d   ightcountry.net.
0x00000050 (00080)   0a0d0a                                ...


Strings