Gen.Variant.Symmi.46681_acc16cee78
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Strictor.47446 (B) (Emsisoft), Gen:Variant.Symmi.46681 (AdAware), Backdoor.Win32.PcClient.FD (Lavasoft MAS)
Behaviour: Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: acc16cee78daf9106fd7c8e1f2ea0efa
SHA1: 78f72b6ca992ebaac31d9c8245ca40d861803675
SHA256: 7bb13242a892bc5c6b8530dfe46ee5f6fc3f99c3c1fe0f3681b1a66d88256209
SSDeep: 24576:HnlS/wdOAZuJo9O86DyqJ3yD4NQWda2RVl:F4wIAZuKYuqJqWdagVl
Size: 1481268 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-09-19 13:50:05
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
mscorsvw.exe:1912
%original file name%.exe:1364
RunDll32.exe:1112
RunDll32.exe:1512
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
__DDrawCheckExclMode__
__DDrawExclMode__
DDrawDriverObjectListMutex
DDrawWindowListMutex
CTF.TMD.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.Layouts.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.Asm.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.Compart.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
CTF.LBES.MutexDefaultS-1-5-21-1844237615-1960408961-1801674531-1003
ZonesLockedCacheCounterMutex
ZonesCounterMutex
ZonesCacheCounterMutex
RasPbFile
WininetProxyRegistryMutex
WininetConnectionMutex
WininetStartupMutex
c:!documents and settings!adm!local settings!history!history.ie5!
c:!documents and settings!adm!cookies!
c:!documents and settings!adm!local settings!temporary internet files!content.ie5!
_!MSFTHISTORY!_
ShimCacheMutex
File activity
The process %original file name%.exe:1364 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\990x90[1] (14680 bytes)
%System%\drivers\etc\hosts.ics (535 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\990x90[1] (1072 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\286[1].png (323 bytes)
%System%\drivers\etc\hosts (535 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ajax-loader[1].gif (3945 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\anti[1].php (533 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\18216[1].htm (810 bytes)
%Documents and Settings%\All Users\Desktop\FAPCF ONE.lnk (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\37481[1].htm (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\FAPCF[1].HTML (695 bytes)
Registry activity
The process mscorsvw.exe:1912 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\.NETFramework\v2.0.50727\NGenService\State]
"AccumulatedWaitIdleTime" = "2340000"
The process %original file name%.exe:1364 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Programs" = "%Documents and Settings%\%current user%\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"ID" = "1411123805"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"NetHood" = "%Documents and Settings%\%current user%\NetHood"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 16 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache]
"@xpsp3res.dll,-20001" = "Diagnose Connection Problems..."
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
"Templates" = "%Documents and Settings%\%current user%\Templates"
[HKLM\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication]
"Name" = "%original file name%.exe"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"SendTo" = "%Documents and Settings%\%current user%\SendTo"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Startup" = "%Documents and Settings%\All Users\Start Menu\Programs\Startup"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"PrintHood" = "%Documents and Settings%\%current user%\PrintHood"
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Fonts" = "%WinDir%\Fonts"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B 5F 34 C7 04 1D B4 08 1C CC 6D 9A 5E 55 E0 6A"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Programs" = "%Documents and Settings%\All Users\Start Menu\Programs"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Recent" = "%Documents and Settings%\%current user%\Recent"
"Favorites" = "%Documents and Settings%\%current user%\Favorites"
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyOverride"
"ProxyServer"
"AutoConfigURL"
The Trojan disables automatic startup of the application by deleting the following autorun value:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"cfire"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"cfire"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"cfiremaster"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"cfiremaster"
The process RunDll32.exe:1112 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B 77 71 3B 09 CF 37 6B 3F 33 04 20 10 58 A7 DD"
The process RunDll32.exe:1512 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "A8 B8 96 E0 FF 90 A2 34 C1 38 A3 C2 DA FB 1F 70"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 533 bytes in size. The following strings are added to the hosts file listed below:
| 9.9.9.9 | mobily.pw |
| 9.9.9.9 | patron.tweethashcount.com |
| 9.9.9.9 | track.ttswebdesign.com |
| 9.9.9.9 | grizzl.thewell-beingcompany.com |
| 9.9.9.9 | rdp.thewalkinginstitute.com |
| 9.9.9.9 | welcome.thesplitscreenphotobooth.com |
| 9.9.9.9 | hello.thesplitscreenphotobooth.com |
| 9.9.9.9 | welcome.thecraftbarnwales.com |
| 9.9.9.9 | hello.sylvanstructures.com |
| 9.9.9.9 | remote.sylvanstructures.com |
| 9.9.9.9 | wuah.chekc.co.vu |
| 9.9.9.9 | canmacar.com |
| 9.9.9.9 | www.canmacar.com |
| 9.9.9.9 | phaelixe.com |
| 9.9.9.9 | nitrous.cf |
| 9.9.9.9 | godlikeweapon.pw |
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: MS
Product Name: Project1
Product Version: 1.00
Legal Copyright:
Legal Trademarks:
Original Filename: fapcfok.exe
Internal Name: fapcfok
File Version: 1.00
File Description:
Comments:
Language: English (United Kingdom)
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| 4096 | 916304 | 61440 | 5.54337 | d2bac3f8ae01a82a2ae6a4c613a4cf1b | |
| 921600 | 8712 | 4096 | 5.54494 | d952c77b155a3477140b9d2801da6af3 | |
| .rsrc | 933888 | 1397864 | 1400832 | 5.54484 | 19f35d5bf6f971a47c05acb515e39a63 |
| 2334720 | 81920 | 10804 | 5.50314 | 41503067f42ad960567e799889b5161b |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://antiweb.zapto.org/ | |
| hxxp://googlecode.l.googleusercontent.com/svn/trunk/anti.php | |
| hxxp://googlecode.l.googleusercontent.com/svn/trunk/FAPCF.HTML | |
| hxxp://whos.amung.us/swidget/fapcfone.png | |
| hxxp://widgets.amung.us/small/02/286.png | |
| hxxp://ad.a-ads.com/18216?size=990x90 | |
| hxxp://ad.a-ads.com/37481?size=990x90 | |
| hxxp://ad.a-ads.com/system/ads/9148/banners/990x90 | |
| hxxp://ad.a-ads.com/system/ads/14633/banners/990x90 | |
| hxxp://static.a-ads.com/system/ads/14633/banners/990x90 | |
| hxxp://static.a-ads.com/system/ads/9148/banners/990x90 | |
| hxxp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML | |
| hxxp://cfpro00007.googlecode.com/svn/trunk/anti.php | |
| hxxp://fapcf001.ddns.net/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /system/ads/14633/banners/990x90 HTTP/1.1
Accept: */*
Referer: hXXp://ad.a-ads.com/37481?size=990x90
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: static.a-ads.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx/1.6.0
Date: Tue, 30 Sep 2014 02:09:23 GMT
Content-Type: application/octet-stream
Content-Length: 55815
Last-Modified: Wed, 24 Sep 2014 13:32:43 GMT
Connection: keep-alive
ETag: "5422c7fb-da07"
Accept-Ranges: bytes......Exif..II*.................Ducky.......d..... hXXp://ns.adobe.com
/xap/1.0/.<?xpacket begin="..." id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.3-c01
1 66.145661, 2012/02/06-14:56:27 "> <rdf:RDF xmlns:rdf="h
ttp://VVV.w3.org/1999/02/22-rdf-syntax-ns#"> <rdf:Description rd
f:about="" xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmlns:xmpMM="http:
//ns.adobe.com/xap/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/s
Type/ResourceRef#" xmp:CreatorTool="Adobe Photoshop CS6 (Windows)" xmp
MM:InstanceID="xmp.iid:73ECF52D43EB11E492F0B25639D741B4" xmpMM:Documen
tID="xmp.did:73ECF52E43EB11E492F0B25639D741B4"> <xmpMM:DerivedFr
om stRef:instanceID="xmp.iid:73ECF52B43EB11E492F0B25639D741B4" stRef:d
ocumentID="xmp.did:73ECF52C43EB11E492F0B25639D741B4"/> </rdf:Des
cription> </rdf:RDF> </x:xmpmeta> <?xpacket end="r"?
>...&Adobe.d...............,....C...x..............................
......................................................................
............................................Z.........................
......................................................................
....0567.. `...3412@%.!$..........................!..1A..4.56.Q".a2B#.
..0qR$tuvw ..br.3C...`..Ss%[email protected].&......................!..2.3.1..
.AQaq......"..0BRrs. ...#$t.`[email protected]....................!1AQ..aq..
.... 0@P.`.................d|>.....................................
..............................................................c..s<<< skipped >>>
GET /18216?size=990x90 HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: ad.a-ads.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html;charset=utf-8
Content-Length: 5252
Connection: keep-alive
Status: 200 OK
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Powered-By: Phusion Passenger 4.0.44
Date: Tue, 30 Sep 2014 02:09:22 GMT
Server: nginx/1.6.0 Phusion Passenger 4.0.44<!DOCTYPE html>.<html lang='en'>.<head>.<style>
;. body{font:13px/1.231 arial,helvetica,clean,sans-serif;*font-size:s
mall;*font:x-small}select,input,textarea,button{font:99% arial,helveti
ca,clean,sans-serif}table{font-size:inherit;font:100%}pre,code,kbd,sam
p,tt{font-family:monospace;*font-size:108%;line-height:100%}html,body{
margin:0;padding:0;background:0 transparent;font-size:16px;font-family
:"Helvetica Neue",Helvetica,Arial,sans-serif}p,a,small{text-align:cent
er}a{color:#0069d6;text-decoration:none;line-height:inherit;font-weigh
t:inherit}a:hover{color:#00438a;text-decoration:underline}.size120x60,
.size120x60 .cell{width:120px;height:60px}.size120x90,.size120x90 .cel
l{width:120px;height:90px}.size120x240,.size120x240 .cell{width:120px;
height:240px}.size120x600,.size120x600 .cell{width:120px;height:600px}
.size125x125,.size125x125 .cell{width:125px;height:125px}.size160x90,.
size160x90 .cell{width:160px;height:90px}.size160x600,.size160x600 .ce
ll{width:160px;height:600px}.size180x90,.size180x90 .cell{width:180px;
height:90px}.size180x150,.size180x150 .cell{width:180px;height:150px}.
size200x90,.size200x90 .cell{width:200px;height:90px}.size200x200,.siz
e200x200 .cell{width:200px;height:200px}.size234x60,.size234x60 .cell{
width:234px;height:60px}.size240x400,.size240x400 .cell{width:240px;he
ight:400px}.size250x250,.size250x250 .cell{width:250px;height:250px}.s
ize300x250,.size300x250 .cell{width:300px;height:250px}.size320x50,.si
ze320x50 .cell{width:320px;height:50px}.size336x280,.size336x280 .<<< skipped >>>
GET /37481?size=990x90 HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml xml, */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: ad.a-ads.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Content-Type: text/html;charset=utf-8
Content-Length: 5253
Connection: keep-alive
Status: 200 OK
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
X-Powered-By: Phusion Passenger 4.0.44
Date: Tue, 30 Sep 2014 02:09:22 GMT
Server: nginx/1.6.0 Phusion Passenger 4.0.44<!DOCTYPE html>.<html lang='en'>.<head>.<style>
;. body{font:13px/1.231 arial,helvetica,clean,sans-serif;*font-size:s
mall;*font:x-small}select,input,textarea,button{font:99% arial,helveti
ca,clean,sans-serif}table{font-size:inherit;font:100%}pre,code,kbd,sam
p,tt{font-family:monospace;*font-size:108%;line-height:100%}html,body{
margin:0;padding:0;background:0 transparent;font-size:16px;font-family
:"Helvetica Neue",Helvetica,Arial,sans-serif}p,a,small{text-align:cent
er}a{color:#0069d6;text-decoration:none;line-height:inherit;font-weigh
t:inherit}a:hover{color:#00438a;text-decoration:underline}.size120x60,
.size120x60 .cell{width:120px;height:60px}.size120x90,.size120x90 .cel
l{width:120px;height:90px}.size120x240,.size120x240 .cell{width:120px;
height:240px}.size120x600,.size120x600 .cell{width:120px;height:600px}
.size125x125,.size125x125 .cell{width:125px;height:125px}.size160x90,.
size160x90 .cell{width:160px;height:90px}.size160x600,.size160x600 .ce
ll{width:160px;height:600px}.size180x90,.size180x90 .cell{width:180px;
height:90px}.size180x150,.size180x150 .cell{width:180px;height:150px}.
size200x90,.size200x90 .cell{width:200px;height:90px}.size200x200,.siz
e200x200 .cell{width:200px;height:200px}.size234x60,.size234x60 .cell{
width:234px;height:60px}.size240x400,.size240x400 .cell{width:240px;he
ight:400px}.size250x250,.size250x250 .cell{width:250px;height:250px}.s
ize300x250,.size300x250 .cell{width:300px;height:250px}.size320x50,.si
ze320x50 .cell{width:320px;height:50px}.size336x280,.size336x280 .<<< skipped >>>
GET / HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: antiweb.zapto.org
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Tue, 30 Sep 2014 02:09:19 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Location: hXXp://cfpro00007.googlecode.com/svn/trunk/anti.php
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
GET /small/02/286.png HTTP/1.1
Accept: */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Connection: Keep-Alive
Host: widgets.amung.us
HTTP/1.1 200 OK
Server: nginx/1.2.4
Date: Tue, 30 Sep 2014 02:09:22 GMT
Content-Type: image/png
Content-Length: 323
Last-Modified: Sun, 13 Jun 2010 09:48:29 GMT
Connection: keep-alive
Expires: Thu, 30 Oct 2014 02:09:22 GMT
Cache-Control: max-age=2592000
Accept-Ranges: bytes.PNG........IHDR...P.........D......9PLTE.bM.nX.82.G:................z
c.....z.UC..n.'-00/...555...........IDAT8...... .CG..c....n....1..QLxi
.F....^.0t....E.f..T........11.;.j..T.H... /...%..$4L..[.`..*.V Ih9X..
....\t.>... AB.!X....).J...........<'[email protected]..?e.d..)..&
lt;...\...=.=.Z...7.N..u..U.....RaI...L.....IEND.B`.HTTP/1.1 200 OK..S
erver: nginx/1.2.4..Date: Tue, 30 Sep 2014 02:09:22 GMT..Content-Type:
image/png..Content-Length: 323..Last-Modified: Sun, 13 Jun 2010 09:48
:29 GMT..Connection: keep-alive..Expires: Thu, 30 Oct 2014 02:09:22 GM
T..Cache-Control: max-age=2592000..Accept-Ranges: bytes...PNG........I
HDR...P.........D......9PLTE.bM.nX.82.G:................zc.....z.UC..n
.'-00/...555...........IDAT8...... .CG..c....n....1..QLxi.F....^.0t...
.E.f..T........11.;.j..T.H... /...%..$4L..[.`..*.V Ih9X......\t.>..
. AB.!X....).J...........<'[email protected]..?e.d..)..<...\...=.=
.Z...7.N..u..U.....RaI...L.....IEND.B`...
GET /system/ads/9148/banners/990x90 HTTP/1.1
Accept: */*
Referer: hXXp://ad.a-ads.com/18216?size=990x90
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: static.a-ads.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx/1.6.0
Date: Tue, 30 Sep 2014 02:09:22 GMT
Content-Type: application/octet-stream
Content-Length: 13690
Last-Modified: Sat, 19 Apr 2014 12:51:11 GMT
Connection: keep-alive
ETag: "5352713f-357a"
Accept-Ranges: bytes.PNG........IHDR.......Z......../....tEXtSoftware.Adobe ImageReadyq.e&
lt;...siTXtXML:com.adobe.xmp.....<?xpacket begin="..." id="W5M0MpCe
hiHzreSzNTczkc9d"?> <x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk=
"Adobe XMP Core 5.5-c021 79.154911, 2013/10/29-11:47:16 "> &
lt;rdf:RDF xmlns:rdf="hXXp://VVV.w3.org/1999/02/22-rdf-syntax-ns#">
<rdf:Description rdf:about="" xmlns:xmpMM="hXXp://ns.adobe.com/xap
/1.0/mm/" xmlns:stRef="hXXp://ns.adobe.com/xap/1.0/sType/ResourceRef#"
xmlns:xmp="hXXp://ns.adobe.com/xap/1.0/" xmpMM:OriginalDocumentID="xm
p.did:6441c9a6-fe46-4ffb-b080-6b59b53864ae" xmpMM:DocumentID="xmp.did:
1CA15CD6BFE511E38D95AA068E2D7AAD" xmpMM:InstanceID="xmp.iid:1CA15CD5BF
E511E38D95AA068E2D7AAD" xmp:CreatorTool="Adobe Photoshop CC (Macintosh
)"> <xmpMM:DerivedFrom stRef:instanceID="xmp.iid:7c648f5c-328c-4
709-9fe7-b0836d2a770f" stRef:documentID="xmp.did:6441c9a6-fe46-4ffb-b0
80-6b59b53864ae"/> </rdf:Description> </rdf:RDF> </x
:xmpmeta> <?xpacket end="r"?>D.;T..1.IDATx....TUU...."..&...
[email protected].......%.O..p$..|..!%Ay...
.n..}.....{...Y.....}.~.s...}.y... .. .. .. .. .. .. .. .. >[email protected]
7h..h..h..h..h..hl...r?.. .. .. ./...A..A..AP.#.. .. ....A..A..AP.#..
.. ..c....C..A..A....aaa.&.n..h..h..h..h..h.....A..A..n..9. .. ...4G..
A..A...9. .. ...4G..A..A...9. ....6n......7.<$;;{...qqq.f.Crr2l....
.`;...5.\..L....m.6.G..]...0...-//.i.....s............SSS.j....F......
._..V.x...B.4.......rh.p.U.V..Myv.. .....rss.w..C.III..$...7n...e.<<< skipped >>>
GET /swidget/fapcfone.png HTTP/1.1
Accept: */*
Referer: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: whos.amung.us
Connection: Keep-Alive
HTTP/1.1 303 See Other
Date: Tue, 30 Sep 2014 02:09:22 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Location: hXXp://widgets.amung.us/small/02/286.png
Set-Cookie: uid=CgH9IVQqENIWWymIKm LAg==; expires=Thu, 31-Dec-37 23:55:55 GMT; domain=atta; path=/0..
GET /svn/trunk/anti.php HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Connection: Keep-Alive
Host: cfpro00007.googlecode.com
HTTP/1.1 200 OK
Date: Tue, 30 Sep 2014 02:09:20 GMT
Server: Apache
Last-Modified: Sun, 07 Sep 2014 02:56:18 GMT
ETag: "35//trunk/anti.php"
Accept-Ranges: bytes
Expires: Tue, 30 Sep 2014 02:12:20 GMT
Cache-Control: public, max-age=180
Content-Length: 533
Content-Type: text/plain
Alternate-Protocol: 80:quic,p=0.019.9.9.9 mobily.pw..9.9.9.9 patron.tweethashcount.com..9.9.9.9 track.tt
swebdesign.com..9.9.9.9 grizzl.thewell-beingcompany.com..9.9.9.9 rdp.t
hewalkinginstitute.com..9.9.9.9 welcome.thesplitscreenphotobooth.com..
9.9.9.9 hello.thesplitscreenphotobooth.com..9.9.9.9 welcome.thecraftba
rnwales.com..9.9.9.9 hello.sylvanstructures.com..9.9.9.9 remote.sylvan
structures.com..9.9.9.9 wuah.chekc.co.vu..9.9.9.9 canmacar.com..9.9.9.
9 VVV.canmacar.com..9.9.9.9 phaelixe.com..9.9.9.9 nitrous.cf..9.9.9.9
godlikeweapon.pw..9.9.9.9 kwi.amulet-am.com....
GET /svn/trunk/FAPCF.HTML HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: cfpro00007.googlecode.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Tue, 30 Sep 2014 02:09:21 GMT
Server: Apache
Last-Modified: Tue, 30 Sep 2014 01:11:27 GMT
ETag: "65//trunk/FAPCF.HTML"
Accept-Ranges: bytes
Expires: Tue, 30 Sep 2014 02:12:21 GMT
Cache-Control: public, max-age=180
Content-Length: 1836
Content-Type: text/plain
Alternate-Protocol: 80:quic,p=0.01<html><head><meta http-equiv="content-type" content="te
xt/html;charset=utf-8"><title></title></head><
body>..<script type="text/javascript">.. var webLink = new
Array("hXXp://VVV.fapcf.com/p/active-success.html<=>LinkBucks&l
t;=>ACTIVE SUCCESS<=>ACTIVE SUCCESS");..var randNumber = Math
.floor(Math.random() * webLink.length);.. var linkActive = webLink[
randNumber];..... function eLinkActive(){....document.write("<div
id='ACTIVEWEB'>" linkActive "");.. }.. </script><font
color="white">..<script type="text/javascript">eLinkActive()
</script></font>..<font color="white">..<div id="
NOTE">INFOMATION: (29/09/2014) UPDATE FAPCF ONE V5.0 - FIX BLOCK A
CC - SUPPORT CF: NA - EU - BZ - RU - PH - INDO - KOREA - TAIWAN - SEA
- ES !!!</div>..<div id="DLLINK">hXXp://VVV.fapcf.com</
div>..<div id="VERHACK">5.0</div>..<div id="VERMODZ"
>FAPCF ONE V4.9 (24/09/2014) - FIX BLOCK ACC</div>..<div i
d="CTIME">90</div>..<div id="WEBPOP">hXXp://VVV.fapcf.c
om</div>..<div id="LB">linkbucks.com/mW2b,linkbucks.com/mW
2T,linkbucks.com/mW2E,linkbucks.com/mW2b,linkbucks.com/mW2T,linkbucks.
com/mW2E</div>..<div id="ADF">adf.ly/ruqY2,adf.ly/ruqdu,ad
f.ly/ruqZ7,adf.ly/ruqbS,adf.ly/ruqY2,adf.ly/ruqdu,adf.ly/ruqZ7,adf.ly/
ruqbS</div>..</font>..<iframe data-aa='37481' src='//ad
.a-ads.com/37481?size=990x90' scrolling='no' style='width:990px; h<<< skipped >>>
GET / HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: fapcf001.ddns.net
Connection: Keep-Alive
HTTP/1.1 302 Found
Date: Tue, 30 Sep 2014 02:09:21 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Location: hXXp://cfpro00007.googlecode.com/svn/trunk/FAPCF.HTML
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
The Trojan connects to the servers at the folowing location(s):
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
IMAGEHLP.dll
rundll32.pdb
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
.manifest
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
Windows
Operating System
5.1.2600.5512
YThere is not enough memory to run the file %s.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Missing entry:%s
Error loading %s
RunDll32.exe_1512:
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
GDI32.dll
USER32.dll
IMAGEHLP.dll
rundll32.pdb
.....eZXnnnnnnnnnnnn3
....eDXnnnnnnnnnnnn3
...eDXnnnnnnnnnnnn,
.eDXnnnnnnnnnnnn,
%Xnnnnnnnnnnnnnnn1
O3$dS7"%U9
.manifest
5.1.2600.5512 (xpsp.080413-2105)
RUNDLL.EXE
Windows
Operating System
5.1.2600.5512
YThere is not enough memory to run the file %s.
Please close other windows and try again.
9The file %s or one of its components could not be opened.
0The file %s or one of its components cannot run.
MThe file %s or one of its components requires a different version of Windows.
UThe file %s or one of its components cannot run in standard or enhanced mode Windows.3Another instance of the file %s is already running./An exception occurred while trying to run "%s"
Error in %s
Missing entry:%s
Error loading %s
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
mscorsvw.exe:1912
%original file name%.exe:1364
RunDll32.exe:1112
RunDll32.exe:1512 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\990x90[1] (14680 bytes)
%System%\drivers\etc\hosts.ics (535 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\990x90[1] (1072 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\286[1].png (323 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\ajax-loader[1].gif (3945 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\anti[1].php (533 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQISTQM\18216[1].htm (810 bytes)
%Documents and Settings%\All Users\Desktop\FAPCF ONE.lnk (1 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\37481[1].htm (810 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\WLMVCPYN\FAPCF[1].HTML (695 bytes) - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.