Analysis Date | 2015-11-13 09:25:28 |
---|---|
MD5 | 05add36f5ccda1dd26fd5f16feec9949 |
SHA1 | e9b6eb0acf6d0d253383308447717c11273d95dc |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: cf6eb4ff43ee5749b1fa34618e11ccfb sha1: f7a78881d62d4481a86d089d3b17809ca65941dd size: 6144 | |
Section | .rdata md5: 94a236ff2c45106f867daeb7d56809cf sha1: 15e5a8a9b04cf7ac431ab7b95d71e1e2f3dade12 size: 3584 | |
Section | .data md5: 8bf016b5494d37dd69a3c2cc605f4605 sha1: 9bb09af60d2e7e7039d310aad2995da59d06efdb size: 2048 | |
Section | .rsrc md5: 9dd23ed6b99542ec0d40f5dcffdd81fd sha1: a0b6d1bd77bb8261a051bbcfc1b11c4eae62f76e size: 19968 | |
Timestamp | 2013-03-05 15:06:40 | |
Packer | Microsoft Visual C 2.0 | |
PEhash | 43eec24f8cac8b9a3a5592c521eb0160ce586b92 | |
IMPhash | 012c63bb5f7f1ff21471f621b5d79f47 | |
AV | Rising | Trojan.Win32.Kryptik.af |
AV | Mcafee | Downloader-FASG!05ADD36F5CCD |
AV | Avira (antivir) | TR/Crypt.ZPACK.160881 |
AV | Twister | no_virus |
AV | Ad-Aware | Trojan.Downloader.JRTI |
AV | Alwil (avast) | GenMalicious-KNL [Trj] |
AV | Eset (nod32) | Win32/Kryptik.DIGI |
AV | Grisoft (avg) | Generic_s.ERC |
AV | Symantec | Downloader.Upatre!gen5 |
AV | Fortinet | W32/Kryptic.ABGK!tr |
AV | BitDefender | Trojan.Downloader.JRTI |
AV | K7 | Trojan ( 004c29131 ) |
AV | Microsoft Security Essentials | TrojanDownloader:Win32/Upatre.G |
AV | MicroWorld (escan) | Trojan.Downloader.JRTI |
AV | MalwareBytes | Trojan.Upatre |
AV | Authentium | W32/Dalexis.Q.gen!Eldorado |
AV | Frisk (f-prot) | W32/Dalexis.Q.gen!Eldorado |
AV | Ikarus | Trojan.VB.Crypt |
AV | Emsisoft | Trojan.Downloader.JRTI |
AV | Zillya! | no_virus |
AV | Kaspersky | Trojan-Downloader.Win32.Upatre.aetm |
AV | Trend Micro | TROJ_UP.9EED1BD4 |
AV | CAT (quickheal) | Trojan.Kadena.B4 |
AV | VirusBlokAda (vba32) | no_virus |
AV | Padvish | no_virus |
AV | BullGuard | Trojan.Downloader.JRTI |
AV | Arcabit (arcavir) | Trojan.Downloader.JRTI |
AV | ClamAV | no_virus |
AV | Dr. Web | Trojan.DownLoader13.29488 |
AV | F-Secure | Trojan.Downloader.JRTI |
AV | CA (E-Trust Ino) | no_virus |
AV | Rising | Trojan.Win32.Kryptik.af |
AV | Mcafee | Downloader-FASG!05ADD36F5CCD |
AV | Avira (antivir) | TR/Crypt.ZPACK.160881 |
AV | Twister | no_virus |
AV | Ad-Aware | Trojan.Downloader.JRTI |
AV | Alwil (avast) | GenMalicious-KNL [Trj] |
AV | Eset (nod32) | Win32/Kryptik.DIGI |
AV | Grisoft (avg) | Generic_s.ERC |
AV | Symantec | Downloader.Upatre!gen5 |
AV | Fortinet | W32/Kryptic.ABGK!tr |
AV | BitDefender | Trojan.Downloader.JRTI |
AV | K7 | Trojan ( 004c29131 ) |
AV | Microsoft Security Essentials | TrojanDownloader:Win32/Upatre.G |
AV | MicroWorld (escan) | Trojan.Downloader.JRTI |
AV | MalwareBytes | Trojan.Upatre |
AV | Authentium | W32/Dalexis.Q.gen!Eldorado |
AV | Frisk (f-prot) | W32/Dalexis.Q.gen!Eldorado |
AV | Ikarus | Trojan.VB.Crypt |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\Xulantar.exe |
---|---|
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\InstallXul.tmp |
Creates Process | C:\Documents and Settings\Administrator\Local Settings\Temp\Xulantar.exe |
Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\Xulantar.exe
Registry | HKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝ NULL |
---|---|
Registry | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝ 1 |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\658HSJSD\icanhazip[1].htm |
Creates File | C:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat |
Creates File | C:\Documents and Settings\Administrator\Cookies\index.dat |
Creates File | PIPE\lsarpc |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat |
Deletes File | C:\malware.exe |
Creates Mutex | c:!documents and settings!administrator!local settings!history!history.ie5! |
Creates Mutex | WininetConnectionMutex |
Creates Mutex | c:!documents and settings!administrator!cookies! |
Creates Mutex | c:!documents and settings!administrator!local settings!temporary internet files!content.ie5! |
Winsock DNS | 91.211.17.201 |
Winsock DNS | 94.127.129.214 |
Winsock DNS | 89.203.144.101 |
Winsock DNS | 84.246.161.47 |
Winsock DNS | 87.249.142.189 |
Winsock DNS | 81.90.175.7 |
Winsock DNS | 217.168.210.122 |
Winsock DNS | 89.203.194.212 |
Winsock DNS | icanhazip.com |
Network Details:
DNS | icanhazip.com Type: A 64.182.208.185 |
---|---|
DNS | icanhazip.com Type: A 64.182.208.184 |
HTTP GET | http://icanhazip.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0 |
HTTP GET | http://91.211.17.201:13392/KAT22/COMPUTER-XXXXXX/0/51-SP3/0/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:36.0) Gecko/20100101 Firefox/36.0 |
Flows TCP | 192.168.1.1:1031 ➝ 64.182.208.185:80 |
Flows TCP | 192.168.1.1:1032 ➝ 91.211.17.201:13392 |
Flows TCP | 192.168.1.1:1033 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1034 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1035 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1036 ➝ 87.249.142.189:443 |
Flows TCP | 192.168.1.1:1037 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1038 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1039 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1040 ➝ 84.246.161.47:443 |
Flows TCP | 192.168.1.1:1041 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1042 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1043 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1044 ➝ 89.203.144.101:443 |
Flows TCP | 192.168.1.1:1045 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1046 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1047 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1048 ➝ 94.127.129.214:443 |
Flows TCP | 192.168.1.1:1049 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1050 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1051 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1052 ➝ 217.168.210.122:443 |
Flows TCP | 192.168.1.1:1053 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1054 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1055 ➝ 89.203.194.212:443 |
Flows TCP | 192.168.1.1:1056 ➝ 89.203.194.212:443 |
Raw Pcap
Strings
Button1 Button2 Dina-download ang Justefy... Nabigong i-download ang Justefy. Downloading Justefy... Ini-extract ang Justefy...)Dina-download ang nilalaman ng partner... Installer ng Justefy @jjj Justefy Kasalukuyang nag-i-installdHindi pa kumpletong nai-install ang Justefy. Sigurado ka bang gusto mong kanselahin ang pag-install? MessageBoxLabel msctls_progress32 MS Shell Dlg Nabigong i-extract ang Justefy. /> ('+!/- ,! ,*- !))"!$ /(+", ! '+$*& (.#+,," "("/-% "&'-,/ "&$,'% ),#)*/ $$ "-, $$&**! &!,! , %"$-+% %(.,(" %(%%-+ + ",/( + $!)" +)&(,& +)#( $ ,( 0- !)0 /&' 00*!#/( 1%+(10& 200#&0& 2?!;/J -#)&,3 *+&*$%3 _acmdln_dll </assembly> <assemblyIdentity <assemblyIdentity <assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> button Cancel _commode_dll CreateWindowExA CRTDLL.dll @.data DefWindowProcA </dependency> <dependency> </dependentAssembly> <dependentAssembly> <description>Justefy</description> DestroyWindow DialogBoxParamA DispatchMessageA $-dVSOZ+ EndDialog ExtractIconA _fmode_dll GetLastError GetLocalTime __GetMainArgs GetMessageA GetModuleFileNameA GetModuleHandleA GetStartupInfoA _global_unwind2 _initterm InterlockedDecrement InterlockedIncrement jdhxM@ KERNEL32.dll language="*" listbox LoadCursorA LoadIconA LoadLibraryA LoadStringA _local_unwind2 lstrcpyA <ms_asmv3:requestedExecutionLevel level="asInvoker" uiAccess="false" /> </ms_asmv3:requestedPrivileges> <ms_asmv3:requestedPrivileges> </ms_asmv3:security> <ms_asmv3:security> </ms_asmv3:trustInfo> <ms_asmv3:trustInfo xmlns:ms_asmv3="urn:schemas-microsoft-com:asm.v3"> NameFile: name="Justefy" name="Microsoft.Windows.Common-Controls" newfile PathAddExtensionW PathGetDriveNumberW PathIsRelativeW PostMessageA PostQuitMessage p'RichW processorArchitecture="*" processorArchitecture="*" publicKeyToken="6595b64144ccf1df" `.rdata RegisterClassExA riched32.dll richedit SendMessageA SetFocus SHELL32.dll SHLWAPI.dll SleepEx snqkdQ static STATIC !This program cannot be run in DOS mode. TranslateMessage type="win32" type="win32" %UlOV' USER32.dll VC20XC00U version="1.0.0.0" version="6.0.0.0" WClass1 WindowA _XcptFilter <?xml version="1.0" encoding="UTF-8" standalone="yes"?>