Analysis Date2015-09-17 15:19:23
MD5eb756367ed9bafe24ed7876ba5c62b11
SHA1d4f654a48d35796473cc10c7ef82e99c97cfad85

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 0d88861c2b3e054aacdb39a67381562d sha1: b6bf044c5e6caaa656974b0b857a4489dadbd395 size: 160256
Section.rdata md5: d5e1fda7b06cfd3e9ae5fdab58d2b0bb sha1: a8d3ac456f3605d3e0c3542bac4abc5117c3e8dd size: 38400
Section.data md5: 1c8f9a1554cd8d7a05a05c108e7f178b sha1: f69c9f80d6a1012441648804d358409ecea739e3 size: 6656
Timestamp2015-03-13 09:39:02
PackerMicrosoft Visual C++ ?.?
PEhash4cb1b045f6dc2d203f190c587d9dd262bc5632b5
IMPhashc213050239eaaed431ecad29820bca52
AVRisingno_virus
AVMcafeeTrojan-FEVX!EB756367ED9B
AVAvira (antivir)TR/Crypt.ZPACK.184532
AVTwisterno_virus
AVAd-AwareGen:Variant.Rodecap.1
AVAlwil (avast)Malware-gen:Win32:Malware-gen
AVEset (nod32)Win32/Rodecap.BJ
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Rodecap.BJ!tr
AVBitDefenderGen:Variant.Rodecap.1
AVK7no_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort
AVMicroWorld (escan)Gen:Variant.Rodecap.1
AVMalwareBytesTrojan.Agent
AVAuthentiumW32/Nivdort.A.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Rodecap
AVEmsisoftGen:Variant.Rodecap.1
AVZillya!no_virus
AVKasperskyTrojan.Win32.Generic
AVTrend Microno_virus
AVCAT (quickheal)TrojanPWS.Crypt.08849
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Rodecap.1
AVArcabit (arcavir)Gen:Variant.Rodecap.1
AVClamAVno_virus
AVDr. Webno_virus
AVF-SecureGen:Variant.Rodecap.1
AVCA (E-Trust Ino)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\pzfbsna\e8hp1k5pmpdfwx8j0jqsk.exe
Creates FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates FileC:\pzfbsna\cd9pfqojk6
Deletes FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates ProcessC:\pzfbsna\e8hp1k5pmpdfwx8j0jqsk.exe

Process
↳ C:\pzfbsna\e8hp1k5pmpdfwx8j0jqsk.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\SNMP Remote Store Telephony ➝
C:\pzfbsna\vyvhdjx.exe
Creates FileC:\pzfbsna\vyvhdjx.exe
Creates FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates FileC:\pzfbsna\fosulld
Creates FileC:\pzfbsna\cd9pfqojk6
Deletes FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates ProcessC:\pzfbsna\vyvhdjx.exe
Creates ServiceHomeGroup Tools Counter Audio Log WMI - C:\pzfbsna\vyvhdjx.exe

Process
↳ Pid 804

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1112

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Process
↳ Pid 1848

Process
↳ Pid 1104

Process
↳ C:\pzfbsna\vyvhdjx.exe

Creates Filepipe\net\NtControlPipe10
Creates FileC:\pzfbsna\rhnv90kyl
Creates FileC:\pzfbsna\ncykpcaog.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates FileC:\pzfbsna\fosulld
Creates FileC:\pzfbsna\cd9pfqojk6
Deletes FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates Processytmcrlwopgdf "c:\pzfbsna\vyvhdjx.exe"

Process
↳ C:\pzfbsna\vyvhdjx.exe

Creates FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates FileC:\pzfbsna\cd9pfqojk6
Deletes FileC:\WINDOWS\pzfbsna\cd9pfqojk6

Process
↳ ytmcrlwopgdf "c:\pzfbsna\vyvhdjx.exe"

Creates FileC:\WINDOWS\pzfbsna\cd9pfqojk6
Creates FileC:\pzfbsna\cd9pfqojk6
Deletes FileC:\WINDOWS\pzfbsna\cd9pfqojk6

Network Details:

DNSmemberaction.net
Type: A
184.168.221.51
DNSmemberdirect.net
Type: A
209.53.114.33
DNSknownaction.net
Type: A
95.211.230.75
DNScrowdmethod.net
Type: A
50.63.202.63
DNSsummeraction.net
Type: A
184.168.221.36
DNScrowdaction.net
Type: A
97.74.42.79
DNScrowddirect.net
Type: A
69.64.147.242
DNSthoughtaction.net
Type: A
74.220.199.8
DNSwateraction.net
Type: A
50.63.202.22
DNSwaterdirect.net
Type: A
66.96.161.145
DNSfightmethod.net
Type: A
184.168.167.179
DNScrowdspeak.net
Type: A
54.235.159.97
DNSgentlemanbrought.net
Type: A
DNSalreadybrought.net
Type: A
DNSfollowmethod.net
Type: A
DNSmembermethod.net
Type: A
DNSfollowaction.net
Type: A
DNSfollowdirect.net
Type: A
DNSfollowbrought.net
Type: A
DNSmemberbrought.net
Type: A
DNSbeginmethod.net
Type: A
DNSknownmethod.net
Type: A
DNSbeginaction.net
Type: A
DNSbegindirect.net
Type: A
DNSknowndirect.net
Type: A
DNSbeginbrought.net
Type: A
DNSknownbrought.net
Type: A
DNSsummermethod.net
Type: A
DNSsummerdirect.net
Type: A
DNSsummerbrought.net
Type: A
DNScrowdbrought.net
Type: A
DNSthoughtmethod.net
Type: A
DNSwatermethod.net
Type: A
DNSthoughtdirect.net
Type: A
DNSthoughtbrought.net
Type: A
DNSwaterbrought.net
Type: A
DNSwomanmethod.net
Type: A
DNSsmokemethod.net
Type: A
DNSwomanaction.net
Type: A
DNSsmokeaction.net
Type: A
DNSwomandirect.net
Type: A
DNSsmokedirect.net
Type: A
DNSwomanbrought.net
Type: A
DNSsmokebrought.net
Type: A
DNSpartymethod.net
Type: A
DNSpartyaction.net
Type: A
DNSfightaction.net
Type: A
DNSpartydirect.net
Type: A
DNSfightdirect.net
Type: A
DNSpartybrought.net
Type: A
DNSfightbrought.net
Type: A
DNSfreshspeak.net
Type: A
DNSexperiencespeak.net
Type: A
DNSfreshniece.net
Type: A
DNSexperienceniece.net
Type: A
DNSfreshwrite.net
Type: A
DNSexperiencewrite.net
Type: A
DNSfreshoclock.net
Type: A
DNSexperienceoclock.net
Type: A
DNSgentlemanspeak.net
Type: A
DNSalreadyspeak.net
Type: A
DNSgentlemanniece.net
Type: A
DNSalreadyniece.net
Type: A
DNSgentlemanwrite.net
Type: A
DNSalreadywrite.net
Type: A
DNSgentlemanoclock.net
Type: A
DNSalreadyoclock.net
Type: A
DNSfollowspeak.net
Type: A
DNSmemberspeak.net
Type: A
DNSfollowniece.net
Type: A
DNSmemberniece.net
Type: A
DNSfollowwrite.net
Type: A
DNSmemberwrite.net
Type: A
DNSfollowoclock.net
Type: A
DNSmemberoclock.net
Type: A
DNSbeginspeak.net
Type: A
DNSknownspeak.net
Type: A
DNSbeginniece.net
Type: A
DNSknownniece.net
Type: A
DNSbeginwrite.net
Type: A
DNSknownwrite.net
Type: A
DNSbeginoclock.net
Type: A
DNSknownoclock.net
Type: A
DNSsummerspeak.net
Type: A
DNSsummerniece.net
Type: A
HTTP GEThttp://memberaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://memberdirect.net/index.php?method&len
User-Agent:
HTTP GEThttp://knownaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdmethod.net/index.php?method&len
User-Agent:
HTTP GEThttp://summeraction.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowddirect.net/index.php?method&len
User-Agent:
HTTP GEThttp://thoughtaction.net/index.php?method&len
User-Agent:
HTTP GEThttp://wateraction.net/index.php?method&len
User-Agent:
HTTP GEThttp://waterdirect.net/index.php?method&len
User-Agent:
HTTP GEThttp://fightmethod.net/index.php?method&len
User-Agent:
HTTP GEThttp://crowdspeak.net/index.php?method&len
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 184.168.221.51:80
Flows TCP192.168.1.1:1032 ➝ 209.53.114.33:80
Flows TCP192.168.1.1:1033 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1034 ➝ 50.63.202.63:80
Flows TCP192.168.1.1:1035 ➝ 184.168.221.36:80
Flows TCP192.168.1.1:1036 ➝ 97.74.42.79:80
Flows TCP192.168.1.1:1037 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1038 ➝ 74.220.199.8:80
Flows TCP192.168.1.1:1039 ➝ 50.63.202.22:80
Flows TCP192.168.1.1:1040 ➝ 66.96.161.145:80
Flows TCP192.168.1.1:1041 ➝ 184.168.167.179:80
Flows TCP192.168.1.1:1042 ➝ 54.235.159.97:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d65 6d626572   se..Host: member
0x00000050 (00080)   61637469 6f6e2e6e 65740d0a 0d0a       action.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206d65 6d626572   se..Host: member
0x00000050 (00080)   64697265 63742e6e 65740d0a 0d0a       direct.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206b6e 6f776e61   se..Host: knowna
0x00000050 (00080)   6374696f 6e2e6e65 740d0a0d 0a0a       ction.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f77646d   se..Host: crowdm
0x00000050 (00080)   6574686f 642e6e65 740d0a0d 0a0a       ethod.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207375 6d6d6572   se..Host: summer
0x00000050 (00080)   61637469 6f6e2e6e 65740d0a 0d0a       action.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f776461   se..Host: crowda
0x00000050 (00080)   6374696f 6e2e6e65 740d0a0d 0a0a       ction.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f776464   se..Host: crowdd
0x00000050 (00080)   69726563 742e6e65 740d0a0d 0a0a       irect.net.....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207468 6f756768   se..Host: though
0x00000050 (00080)   74616374 696f6e2e 6e65740d 0a0d0a     taction.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657261   se..Host: watera
0x00000050 (00080)   6374696f 6e2e6e65 740d0a0d 0a0d0a     ction.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a207761 74657264   se..Host: waterd
0x00000050 (00080)   69726563 742e6e65 740d0a0d 0a0d0a     irect.net......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206669 6768746d   se..Host: fightm
0x00000050 (00080)   6574686f 642e6e65 740d0a0d 0a         ethod.net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 64266c65 6e204854 54502f31   ethod&len HTTP/1
0x00000020 (00032)   2e300d0a 41636365 70743a20 2a2f2a0d   .0..Accept: */*.
0x00000030 (00048)   0a436f6e 6e656374 696f6e3a 20636c6f   .Connection: clo
0x00000040 (00064)   73650d0a 486f7374 3a206372 6f776473   se..Host: crowds
0x00000050 (00080)   7065616b 2e6e6574 0d0a0d0a 0a         peak.net.....


Strings