Gen.Heur.ManBat.1_c312bfd8b8
Trojan.Win32.VBKrypt.deqp (Kaspersky), Gen:Heur.ManBat.1 (B) (Emsisoft), Gen:Heur.ManBat.1 (AdAware), GenericUSBInfector.YR, GenericAutorunWorm.YR, GenericUDPFlooder.YR, GenericIRCBot.YR, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan, Flooder, Worm, WormAutorun, IRCBot, UDPFlooder, USBInfector
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: c312bfd8b83dee3d3ebd1912c0d4ff73
SHA1: 16abfbbc4bbcc1c8fd1f209eeff1cc9a4be3b03a
SHA256: 8431f3851b4a7b06569287419065fb98c6ccf238c69ba0a668163359c1f20534
SSDeep: 6144:tcuxuZ4yKr6cDhDVa3jE4p053KTz7oSW/K8hM:tcuxDF9D9YNp05EXoS58hM
Size: 286998 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2008-12-06 19:59:56
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer. |
| IRCBot | A bot can communicate with command and control servers via IRC channel. |
| UDPFlooder | This program can make a UDP flood. A UDP flood attack is a denial-of-service attack using the User Datagram Protocol (UDP). It can be initiated by sending a large number of UDP packets to random ports on a remote host. |
| USBInfector | A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer. |
Process activity
The Trojan creates the following process(es):
Lskmkx.exe:652
Lskmkx.exe:2040
%original file name%.exe:388
%original file name%.exe:704
The Trojan injects its code into the following process(es):
vmacthlp.exe:892
Explorer.EXE:532
csrss.exe:656
winlogon.exe:680
services.exe:724
lsass.exe:736
svchost.exe:904
wmiprvse.exe:984
svchost.exe:988
svchost.exe:1084
svchost.exe:1128
svchost.exe:1180
spoolsv.exe:1424
jqs.exe:1640
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:704 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe (1425 bytes)
Registry activity
The process Lskmkx.exe:652 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "62 CD F5 0C C0 66 21 95 89 12 AD 80 4B 83 1B D6"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
The process Lskmkx.exe:2040 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "73 73 0A 49 8F 8B F4 F8 8F 92 26 9F 7C 84 A6 BC"
The process %original file name%.exe:388 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D0 01 57 75 06 80 AC 94 71 A3 D0 2F 8E 0B 9D 0D"
The process %original file name%.exe:704 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "87 D3 CC 1C 49 22 0C 8E 5F 11 43 EB 0B 1A 84 94"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system]
"Shell" = "explorer.exe,%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"Shell" = "explorer.exe,%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
To automatically run itself each time Windows is booted, the Trojan adds the following link to its file to the system registry autorun key:
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
The Trojan installs the following user-mode hooks in WININET.dll:
HttpSendRequestW
InternetWriteFile
HttpSendRequestA
The Trojan installs the following user-mode hooks in WS2_32.dll:
send
The Trojan installs the following user-mode hooks in kernel32.dll:
MoveFileA
CopyFileW
CopyFileA
MoveFileW
CreateFileW
CreateFileA
The Trojan installs the following user-mode hooks in ntdll.dll:
LdrLoadDll
NtResumeThread
NtQueryDirectoryFile
NtEnumerateValueKey
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.
A program can register a device notification with the help of RegisterDeviceNotification. So it is notified when a USB device is plugged and then the worm copies itself to the USB device plugged into the affected computer.
VersionInfo
Company Name: hb
Product Name: waemsecgwv
Product Version: 4.03.0014
Legal Copyright:
Legal Trademarks:
Original Filename: yfe.exe
Internal Name: yfe
File Version: 4.03.0014
File Description: pds
Comments: ynp
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| yhgx | 4096 | 1339392 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| fshb | 1343488 | 233472 | 232960 | 5.54359 | 7a0963b058ab8d4ae8deaad5898a265b |
| .rsrc | 1576960 | 131072 | 53014 | 2.89577 | 085c6db1ef94eddae8e305bd43d19841 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://api.wipmania.com/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN Dorkbot GeoIP Lookup to wipmania
ET MALWARE Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
ET POLICY External IP Lookup Attempt To Wipmania
ET TROJAN IRC Nick change on non-standard port
Traffic
GET / HTTP/1.1
User-Agent: Mozilla/4.0
Host: api.wipmania.com
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 02 Oct 2014 11:50:32 GMT
Content-Type: text/html
Content-Length: 21
Connection: keep-alive
Keep-Alive: timeout=20193.138.244.231<br>UAHTTP/1.1 200 OK..Server: nginx..Date: Thu,
02 Oct 2014 11:50:32 GMT..Content-Type: text/html..Content-Length: 21.
.Connection: keep-alive..Keep-Alive: timeout=20..193.138.244.231<br
>UA..
The Trojan connects to the servers at the folowing location(s):
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%WinDir%\Explorer.EXE
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
Lskmkx.exe
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\explorer.exe
csrss.exe_656_rwx_00A90000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
\??\%System%\csrss.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\csrss.exe
winlogon.exe_680_rwx_00AD0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
\??\%System%\winlogon.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\winlogon.exe
services.exe_724_rwx_00050000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\services.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\services.exe
lsass.exe_736_rwx_00A10000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\lsass.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\lsass.exe
svchost.exe_904_rwx_00940000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
wmiprvse.exe_984_rwx_00DE0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\wbem\wmiprvse.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\wbem\wmiprvse.exe
svchost.exe_988_rwx_009C0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
svchost.exe_1084_rwx_02A80000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%WinDir%\System32\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
svchost.exe_1128_rwx_007E0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
svchost.exe_1180_rwx_00CC0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\svchost.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\svchost.exe
spoolsv.exe_1424_rwx_00B70000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%System%\spoolsv.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\WINDOWS\system32\spoolsv.exe
jqs.exe_1640_rwx_010C0000_00024000:
.text
`.rdata
@.data
.reloc
:.datt
tB<%u4
toSSSSSSSSSShl
ShellExecuteA
SHELL32.dll
InternetOpenUrlA
HttpQueryInfoW
WININET.dll
SHLWAPI.dll
ntdll.dll
WS2_32.dll
MSVCRT.dll
GetProcessHeap
GetWindowsDirectoryW
ConnectNamedPipe
CreateNamedPipeA
DisconnectNamedPipe
GetWindowsDirectoryA
KERNEL32.dll
USER32.dll
RegCloseKey
RegCreateKeyExW
ADVAPI32.dll
ole32.dll
%s.%s
%s.%S
%s.Blocked "%S" from creating "%s"
%s.Blocked "%S" from creating "%s" - "%s" will be removed at reboot!
autorun.inf
%s.Blocked "%S" from creating "%S"
%s.Blocked "%S" from creating "%S" - "%s" will be removed at reboot!
%s.Blocked "%s" from removing our bot file!
%s.Blocked "%S" from removing our bot file!
%s.%s ->> %s : %s
%s.Blocked "%s" from moving our bot file
%s.Blocked "%S" from moving our bot file
%s.p10-> Link sent!
%s.p21-> Link sent!
msnmsg
JOIN #
%s.Detected process "%S" sending an IRC packet to server %s:%d.. Removing at reboot
PRIVMSG #
%s.PTF://%s:%s@%s:%d (p='%S')
PASS %s
USER %s
%s.Blocked possible browser exploit pack call on URL '%s'
%s.Blocked possible browser exploit pack call on URL '%S'
1.0.0
hXXp://VVV.nobrain.dk
msn.set
msn.int
w00t.edu
dns.photomarket.me
USER %s 0 0 :%s
NICK %s
JOIN %s %s
PART %s
PRIVMSG %s :%s
QUIT :%s
PONG %s
PRIVMSG
[v ="%s" c="%s" h="%s" p="%S"]
[d="%s" s="%d bytes"] Updated bot file "%S"
[d="%s" s="%d bytes"] Executed file "%S"
[Slowloris]: Starting flood on "%s" for %d minutes
[Slowloris]: Finished flood on "%s"
[UDP]: Starting flood on "%s" for %d seconds
[UDP]: Finished flood on "%s"
[SSYN]: Starting flood on "%s" for %d seconds
[SSYN]: Finished flood on "%s"
[USB]: Infected %s
[MSN]: Updated MSN spread link to "%s"
[MSN]: Updated MSN spread interval to "%s"
[Visit]: Visited "%s"
[d="%s" s="%d bytes"] Error update md5 mismatch (%s != %s)
[d="%s"] Error downloading file [e="%d"]
[d="%s"] Error writing download to "%S" [e="%d"]
[d="%s" s="%d bytes"] Error creating process "%S" [e="%d"]
[d="%s" s="%d bytes"] File "%S" has an invalid binary type.. [type="%d"]
[d="%s"] Error getting temporary filename. [e="%d"]
[d='%s"] Error getting application data path [e="%d"]
[Visit]: Error visitng "%s"
[FTP Login]: %s
[FTP Infect]: %s was iframed
[HTTP Login]: %s
[HTTP Traffic]: %s
[Ruskill]: Removing "%s" at reboot
[PDef ]: %s
[DNS]: Blocked DNS "%s"
[MSN]: %s
ftplog
ftpinfect
httplogin
httptraff
hXXp://api.wipmania.com/
\\.\pipe\%s_ipc
<iframe src ="hXXp://VVV.google.co.uk" width="100%" height="300"></iframe>
print '%s<br>';
%s<br>%s
.webroot.
.fortinet.
.virusbuster..nprotect.
.gdatasoftware.
.virus.
.precisesecurity.
.lavasoft.
check.tc
.emsisoft.
.onlinemalwarescanner.
onecare.live.
.bullguard.
.clamav.
.pandasecurity.
.sophos.
.malwarebytes.
.sunbeltsoftware.
.norton.
.norman.
.mcafee.
.symantec
.comodo.
.avast.
.avira.
.avg.
.bitdefender.
.eset.
.kaspersky.
.trendmicro.
.iseclab.
.virscan.
.garyshood.
.viruschief.
.jotti.
.threatexpert.
.novirusthanks.
.virustotal.
*runescape*/*weblogin*
*&password=*
*no-ip*/login*
*steampowered*/login*
quick_password
*hackforums.*/member.php
*facebook.*/login.php*
*login.yahoo.*/*login*
passwd
login
*passwd=*
*login.live.*/*post.srf*
TextfieldPassword
*TextfieldPassword=*
*gmx.*/*FormLogin*
*Passwd=*
FLN-Password
*FLN-Password=*
*pass=*
*bigstring.*/*index.php*
*screenname.aol.*/login.psp*
password
loginId
*password=*
*aol.*/*login.psp*
Passwd
*google.*/*ServiceLoginAuth*
login_password
login_email
*login_password=*
*paypal.*/webscr?cmd=_login-submit*
%s / ?%d HTTP/1.1
Host: %s
User-Agent: %s
Mozilla/4.0
MSG %d %s %d
MSG %d %1s
SDG %d %d
Content-Length: %d
SDG %d
%s:%d
hXXp://%s/%s
hXXp://%s/
POST /23s
{%s|%s}%sn{%s|%s}%s%s|%s
%s|%s|%s
icon=shell32.dll,7
shellexecute=
%windir%\system32\cmd.exe
/c "start Í%
&&%windir%\explorer.exe
\\.\%c:
%s\%s
%sautorun.tmp
%sautorun.inf
%s.exe
URLDownloadToFileW
URLDownloadToFileA
HttpSendRequestW
HttpSendRequestA
NtEnumerateValueKey
%s.disable
%s-Mutex
%s_%d
%s_%lu
kernel32.dll
%Program Files%\Java\jre6\bin\jqs.exe
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe
%WinDir%
wlcomm.exe
msmsgs.exe
msnmsgr.exe
pidgin.exe
iexplore.exe
firefox.exe
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\System
.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run
"%s" %S
Internet Explorer\iexplore.exe
lol.exe
explorer.exe
urlmon.dll
nspr4.dll
dnsapi.dll
wininet.dll
ws2_32.dll
Akernel23.dll
yntdll.dll
\Device\HarddiskVolume1\Program Files\Java\jre6\bin\jqs.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
Lskmkx.exe:652
Lskmkx.exe:2040
%original file name%.exe:388
%original file name%.exe:704 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Application Data\Lskmkx.exe (1425 bytes)
- Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"Lskmkx" = "%Documents and Settings%\%current user%\Application Data\Lskmkx.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.