Gen.Variant.Zbot.15_ea805843d3
HEUR:Backdoor.Win32.Generic (Kaspersky), Gen:Variant.Zbot.15 (B) (Emsisoft), Gen:Variant.Zbot.15 (AdAware), Shiz.YR, Sinowal.YR, GenericInjector.YR, BankerGeneric.YR (Lavasoft MAS)
Behaviour: Banker, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: ea805843d32cbea341ce6e796599db85
SHA1: 177e0844dfab6470bb3c670b3cd5df0fddf678b6
SHA256: ef8db9d910908644084bd0f63d5c6ea3b07d79960c1170c1f4f6015514c4300f
SSDeep: 3072:pxG5Er7 qD/mfP/BnY F0Su7n7yQX7dPzKSvk:pxh9O1l6SkZs
Size: 101376 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: AKorea
Created at: 2000-06-25 06:33:28
Analyzed on: WindowsXP SP3 32-bit
Summary:
Banker. Steals data relating to online banking systems, e-payment systems and credit card systems.
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1988
The Trojan injects its code into the following process(es):
services.exe:764
Explorer.EXE:1684
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
No files have been created.
Registry activity
The process %original file name%.exe:1988 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C8 22 1A 33 11 24 9E 62 B0 F0 6B C1 2A E2 B1 54"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
Company Name: Svxruw Uwzyhjm Owipnut Xtpnusy
Product Name: Fdkip Anlsq
Product Version: 0.2.5.1
Legal Copyright: Wyhkm
Legal Trademarks:
Original Filename:
Internal Name:
File Version: 4.1.7.8
File Description: Xpuvqw Utign Fuovtbi Dkipt
Comments:
Language: Language Neutral
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 29855 | 30208 | 5.18662 | 74b88f46604ee78a5a6b365595e15b4a |
| .data | 36864 | 60016 | 60416 | 4.94398 | 45f6076214648553307c4f2e7ef4126e |
| .idata | 98304 | 1366 | 1536 | 3.19634 | 340ff712aad3815a7109ad7db87d516a |
| .rsrc | 102400 | 8164 | 8192 | 5.01446 | 70974b91b1d2477a08b312a799ca5e00 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
No activity has been detected.
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
|$L.tj
t.Vh<2
SSSh*
u#SSSh
SSShh@
SSShP
SSShV
beautifumortimer.com
POST /gate.php HTTP/1.0
Host: %s
Content-Length: %u
195.222.17.0
74.55.143.0
62.67.184.0
208.43.44.0
188.40.74.0
212.59.118.0
81.176.67.0
87.242.75.0
83.102.130.0
207.44.254.0
75.125.212.0
74.86.125.0
75.125.43.0
75.125.189.0
74.54.46.0
74.54.130.0
174.120.184.0
174.120.185.0
174.133.38.0
74.54.139.0
74.86.232.0
74.53.70.0
208.43.71.0
174.120.186.0
75.125.185.0
74.55.74.0
95.140.225.0
94.236.0.0
94.23.206.0
93.191.13.0
93.184.71.0
92.53.106.0
92.123.155.0
91.209.196.0
91.199.212.0
91.121.97.0
90.183.101.0
90.156.159.0
89.202.157.0
89.202.149.0
89.111.176.0
89.108.66.0
88.221.119.0
87.242.79.0
87.242.74.0
87.242.72.0
87.238.48.0
87.230.79.0
87.106.254.0
87.106.242.0
85.31.222.0
85.255.19.0
85.214.106.0
85.17.210.0
85.12.57.0
84.40.30.0
83.223.117.0
83.222.31.0
83.222.23.0
83.202.175.0
82.98.86.0
82.165.103.0
82.151.107.0
82.117.238.0
81.24.35.0
81.177.31.0
81.176.66.0
80.86.107.0
80.237.132.0
80.190.154.0
80.190.130.0
80.153.193.0
79.125.5.0
78.47.87.0
78.137.164.0
78.108.86.0
75.125.82.0
75.125.29.0
74.55.40.0
74.53.201.0
74.52.233.0
74.50.0.0
74.208.20.0
74.208.158.0
74.125.77.0
72.32.70.0
72.32.149.0
72.32.125.0
72.3.254.0
72.232.246.0
70.84.211.0
69.93.226.0
69.57.142.0
69.20.104.0
69.18.148.0
69.162.79.0
68.177.102.0
67.227.172.0
67.225.206.0
67.192.135.0
67.19.34.0
67.15.231.0
67.15.103.0
67.134.208.0
66.77.70.0
66.249.17.0
66.223.50.0
65.55.240.0
65.55.184.0
65.175.38.0
64.78.182.0
64.66.190.0
64.41.151.0
64.41.142.0
64.246.4.0
64.202.189.0
64.13.134.0
64.128.133.0
63.85.36.0
62.75.216.0
62.75.163.0
62.213.110.0
62.189.194.0
62.146.66.0
62.146.210.0
62.14.249.0
38.113.1.0
217.174.103.0
217.170.21.0
217.16.16.0
217.106.234.0
216.99.133.0
216.55.183.0
216.49.94.0
216.49.88.0
216.246.90.0
216.239.122.0
216.12.145.0
216.10.192.0
213.31.172.0
213.220.100.0
213.198.89.0
213.171.218.0
213.133.34.0
212.8.79.0
212.72.62.0
212.67.88.0
212.47.219.0
209.87.209.0
209.62.68.0
209.62.112.0
209.51.167.0
209.216.46.0
209.160.22.0
209.157.69.0
209.124.55.0
208.79.250.0
207.66.0.0
207.46.232.0
207.46.20.0
207.46.18.0
207.44.154.0
206.204.52.0
205.227.136.0
205.178.145.0
204.14.90.0
203.160.188.0
199.203.243.0
198.6.49.0
195.70.37.0
195.64.225.0
195.55.72.0
195.210.42.0
195.2.240.0
195.146.235.0
195.137.160.0
194.33.180.0
194.206.126.0
194.112.106.0
194.109.142.0
194.0.200.0
193.71.68.0
193.69.114.0
193.66.251.0
193.24.237.0
193.193.194.0
193.17.85.0
193.110.109.0
193.1.193.0
193.0.6.0
192.150.94.0
188.93.8.0
18.85.2.0
166.70.98.0
165.160.15.0
162.40.10.0
155.35.248.0
150.70.93.0
149.101.225.0
141.202.248.0
139.91.222.0
128.130.60.0
128.130.56.0
128.111.48.0
sfc.dll
winlogon.exe
\\.\PhysicalDrive
smss.exe
csrss.exe
lsass.exe
%s\%s
%d.%d.%d.%d
route.exe -p add %s mask 255.255.255.0 %s
Software\Microsoft\Windows NT\CurrentVersion
%s!%s!X
SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command
[[[URL: %s
Process: %s
Referer: %s
User-Agent: %s
Title: %s]]]
ntdll.dll
keys
bssrepp\private.txt
bssrepp\keys
bssrepp\public.txt
keys.zip
\*.key
\self.cer
self.cer
path.txt
pass.log
ctunnel.exe
ctunnel.zip
path_ctunnel.txt
keylog.txt
links.log
Content-Disposition: form-data; name="file"; filename="report"
header.key
keys99
\header.key
masks2.key
\masks2.key
masks.key
\masks.key
name.key
\name.key
primary2.key
\primary2.key
primary.key
\primary.key
keys99.zip
path99.txt
user32.dll
prv_key.pfx
keys\
sign.cer
\History.IE5\index.dat
https
\Opera\Opera\typed_history.xml
secret.key
pubkeys.key
\\.\KmxAgent
\Windows Defender
MpClient.dll
____AVP.Root
avipc.dll
\AVG\AVG9\dfncfg.dat
\AVG\AVG9\dfmcfg.dat
kernel32.dll
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix\Q246009
Server 2003 for Itanium64
Server 2003 for AMD64
smime3.dll
nss3.dll
softokn3.dll
nssutil3.dll
sqlite3.dll
plc4.dll
plds4.dll
nspr4.dll
mozcrt19.dll
webmoney
PK11_ListCerts
CERT_DestroyCertList
CERT_GetDefaultCertDB
PORT_UCS2_UTF8Conversion
PORT_SetUCS2_ASCIIConversionFunction
PK11_GetInternalKeySlot
PK11_CheckUserPassword
SEC_PKCS12AddPasswordIntegrity
SEC_PKCS12CreatePasswordPrivSafe
SEC_PKCS12AddCertAndKey
SEC_PKCS12DestroyExportContext
SEC_PKCS12CreateExportContext
1234567890
firefox
\Mozilla\Firefox\profiles.ini
\Mozilla\Firefox\
balance.htm
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
action=auth&np=&login=
IW_FormName=fmLogin&IW_FormClass=TfmLogin
opera.dll
HttpSendRequestA
HttpSendRequestW
Title: %s
User-agent: %s]]]
{{{%s}}}Kernel32.dll
\*.bk
ISClient.cfg
interpro.ini
rfk.zip
pass_
login=
password=
ws2_32.dll
Agava_Client.exe
KeysDiskPath
Agava_Client.ini
Agava_keys
keys_path.txt
path1.txt
inter.zip
cbsmain.dll
bsi.dll
vb_pfx_import
iexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|mnp.exe|loadmain.exe
hXXp://
/knok.php?id=
hXXp://beautifumortimer.com/knok.php?id=
C:\temp_file_bin
login
software\microsoft\windows nt\currentversion\winlogon
SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
%d:TCP
%d:TCP:*:Enabled:%d
%Program Files%
services.exe
/socks.php?name=
&port=
iexplore.exe
java.exe
javaw.exe
javaws.exe
opera.exe
mnp.exe
explorer.exe
isclient.exe
intpro.exe
loadmain.exe
advapi32.dll
sks2xyz.dll
FilialRCon.dll
Wininet.dll
qlogin
SYSTEM!XP1!F9BE9A8A
XP Service Pack 3
%Program Files%\Common Files\
WinExec
GetProcessHeap
GetSystemWindowsDirectoryA
RegOpenKeyExA
RegCreateKeyExA
RegFlushKey
RegCloseKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
PFXExportCertStoreEx
CertDuplicateCertificateContext
CertEnumCertificatesInStore
PFXImportCertStore
CertGetNameStringA
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
SHFileOperationA
URLDownloadToFileA
GetKeyboardState
GetKeyState
DeleteUrlCacheEntry
InternetOpenUrlA
6$6$6$6$6 6
.text
`.rdata
@.data
.reloc
KERNEL32.DLL
ADVAPI32.dll
CRYPT32.dll
IPHLPAPI.DLL
MSVCRT.dll
ole32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
SHLWAPI.dll
urlmon.dll
USER32.dll
WININET.dll
WS2_32.dll
J,%u?>
hXXps://light.wmtransfer.com/login.aspx?ReturnUrl=/default.aspx
btnLogin
lself.cer
\secrets.key
services.exe_764_rwx_00093000_00001000:
Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\
5.1.2600.551
\Driver\PptpMiniport
services.exe_764_rwx_000B2000_00001000:
w2.5.29.1
w2.5.29.2
w2.5.29.4
w2.5.29.7
w2.5.29.8
w2.5.29.10
w2.5.29.15
w2.5.29.19
w2.5.29.32
w1.3.6.1.5.5.7.2.2
w2.5.29.35
w2.5.29.14
w2.5.29.17
w2.5.29.18
w2.5.29.21
w1.3.6.1.5.5.7.1.1
w2.5.29.31
w1.3.6.1.4.1.311.2.1.14
w1.2.840.113549.1.9.14
w1.3.6.1.4.1.311.10.2
w2.5.29.37
w1.3.6.1.4.1.311.10.1
w1.2.840.113549.3.2
w1.2.840.113549.1.9.15
w1.2.840.113549.1.9.5
w1.3.6.1.4.1.311.13.2.1
w1.3.6.1.4.1.311.13.2.2
w2.5.29.20
w2.5.29.27
w2.5.29.28
w2.5.29.46
w2.5.29.30
w2.5.29.33
w2.5.29.5
w2.5.29.36
w1.3.6.1.4.1.311.10.9.1
w1.3.6.1.4.1.311.21.7
w2.5.29.3
\\.\PIPE\scerpc
services.exe_764_rwx_000B9000_00001000:
q CKM66.228.61.232
%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\
%WinDir%\System32\svchost.exe -k netsvcs
\svchost.exe.Con
%System%\svchost -k rpcss
services.exe_764_rwx_000C7000_00001000:
.dll,!
w0.9.2342.19200300.100.1.25
%System%\userinit.exe,%System%\mqbgmm.exe,
%Documents and Settings%\LocalService\Local Settings\History\History.IE5\index.dat
%System%\mqbgmm.exe,
ware\microsoft\windows nt\currentversion\winlogon
services.exe_764_rwx_000CD000_00001000:
hXXp://beautifumortimer.com/knok.php?id=SYSTEM!XP1!F9BE9A8A&ver=16&up=1348&os=XP Service Pack 3
CryptDllExportPublicKeyInfoEx
CryptDllImportPublicKeyInfoEx
CryptDllConvertPublicKeyInfo
w1.3.14.3.2.12
services.exe_764_rwx_000D2000_00001000:
w2.5.4.4
:2013021120130212:
beautifumortimer.com
%Documents and Settings%\LocalService\Local Settings\Temporary Internet Files\Content.IE5\index.dat
w2.5.4.10
w2.5.4.3
INDOWS\system32\route.exe
5.1.2600.5512
0303030303030303
Explorer.EXE_1684_rwx_000C4000_00001000:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\index.dat
\\?\IDE#CdRomNECVMWar_VMware_IDE_CDR10_______________1.00____#3031303030303030303030303030303030303130#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}%Documents and Settings%\All Users\Start Menu\Programs\Startup
%System%\stobject.dll
Explorer.EXE_1684_rwx_000E2000_00001000:
%SystemRoot%\system32\mswsock.dll
%Program Files%\VMware\VMware Tools\VSock SDK\bin\win32\vsocklib.dll
Tcpip
CLSID\{8C7461EF-2B13-11D2-BE35-3078302C2030}%System%\browseui.dll
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Lockdown_Zones\3
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
%Documents and Settings%\%current user%\My Documents
ice\{E1070104-F404-44CE-B556-0622F9D63EE5}CLSID\{26FDC864-BE88-46E7-9235-032D8EA5162E}%System%\SHELL32.dll
Explorer.EXE_1684_rwx_000F4000_00001000:
@C:\PROGRA~1\MOVIEM~1\wmm2res.dll,-61446
%SystemRoot%\system32\mswsock.dll
%WinDir%\LastGood
ice\{E1070104-F404-44CE-B556-0622F9D63EE5}Maker.lnk
%Program Files%\Movie Mak
%WinDir%\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\
%Documents and Settings%\All Users\Application Data\Adobe\Acrobat\9.0\Replicate\Security\
ISTRY\USER\S-1-5-21-1844237615-1960408961-1801674531-1003_Classes\Drive\shellex\FolderExtensions\{fbeb8a05-beee-4442-804e-409d6c4515e9}MSAFD NetBIOS [\Device\NetBT_Tcpip_{FA3B3797-8A29-4E30-9B14-9ECEA8F69703}] SEQPACKET 2
Explorer.EXE_1684_rwx_0010C000_00001000:
@shell32.dll,-22016
4/04/10 13:22:14 1684.35]
4/04/10 13:22:14 1684.36]
Wizard.lnk
[2014/04/10 13:22:14 1684.37]
wiz.exe
b8a05-beee-4442-
Explorer.EXE_1684_rwx_0013A000_00001000:
1.2.840.113549.1.9.16.2.3
1.2.840.113549.1.9.16.2.4
1.3.6.1.4.1.311.12.1.1
1.3.6.1.4.1.311.12.1.2
sk: 255.255.255.0
02:\SOFTWARE\Microsoft\Windows\CurrentVersion\SideBySide\Installations\x86_policy.8.0.Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.193_x-ww_ac24e7bf\downlevel_manifest.8.0.50727.193\
NDOWS;%WinDir%\System32\Wbem;c:\Program Files\Wireshark
Explorer.EXE_1684_rwx_00142000_00001000:
IsFileSupportedName
Set\ServCLSID\{F020E586-5264-11D1-A532-0000F8757D7E}%System%\hnetcfg.dll
CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}%System%\wbem\wbemprox.dll
0D04FE0-3AEA-1069-A2D8-08002B30309D}\::{21EC2020-3AEA-1069-A2DD-08002B30309D}
Explorer.EXE_1684_rwx_00153000_00002000:
ice\NetBT_Tcpip_{E1070104-F404-44CE-B556-0622F9D63EE5}DCLSID\{5B4DAE26-B807-11D0-9815-00C04FD91972}NDOWS;%WinDir%\System32\Wbem;c:\Program Files\Wireshark
ADOBER~1.LNKAdobe Reader 9.lnk
Explorer.EXE_1684_rwx_0015B000_00001000:
{E1070104-F404-44CE-B556-0622F9D63EE5}AMD PCNET Family PCI Ethernet Adapter - Packet Scheduler Miniport
192.168.25.207
255.255.255.0
192.168.25.3
0.0.0.0
255.255.255.255
192.168.25.26
urCLSID\{ECD4FC4F-521C-11D0-B792-00A0C90312E1}erl\site\bin;C:\Perl\bin;%System%;%WinDir%;%WinDir%\System32\Wbem;c:\Program Files\Wireshark
ess Monitor - Exporting event data
Explorer.EXE_1684_rwx_00EE0000_00021000:
|$L.tj
t.Vh<2
SSSh*
u#SSSh
SSShh@
SSShP
SSShV
beautifumortimer.com
POST /gate.php HTTP/1.0
Host: %s
Content-Length: %u
195.222.17.0
74.55.143.0
62.67.184.0
208.43.44.0
188.40.74.0
212.59.118.0
81.176.67.0
87.242.75.0
83.102.130.0
207.44.254.0
75.125.212.0
74.86.125.0
75.125.43.0
75.125.189.0
74.54.46.0
74.54.130.0
174.120.184.0
174.120.185.0
174.133.38.0
74.54.139.0
74.86.232.0
74.53.70.0
208.43.71.0
174.120.186.0
75.125.185.0
74.55.74.0
95.140.225.0
94.236.0.0
94.23.206.0
93.191.13.0
93.184.71.0
92.53.106.0
92.123.155.0
91.209.196.0
91.199.212.0
91.121.97.0
90.183.101.0
90.156.159.0
89.202.157.0
89.202.149.0
89.111.176.0
89.108.66.0
88.221.119.0
87.242.79.0
87.242.74.0
87.242.72.0
87.238.48.0
87.230.79.0
87.106.254.0
87.106.242.0
85.31.222.0
85.255.19.0
85.214.106.0
85.17.210.0
85.12.57.0
84.40.30.0
83.223.117.0
83.222.31.0
83.222.23.0
83.202.175.0
82.98.86.0
82.165.103.0
82.151.107.0
82.117.238.0
81.24.35.0
81.177.31.0
81.176.66.0
80.86.107.0
80.237.132.0
80.190.154.0
80.190.130.0
80.153.193.0
79.125.5.0
78.47.87.0
78.137.164.0
78.108.86.0
75.125.82.0
75.125.29.0
74.55.40.0
74.53.201.0
74.52.233.0
74.50.0.0
74.208.20.0
74.208.158.0
74.125.77.0
72.32.70.0
72.32.149.0
72.32.125.0
72.3.254.0
72.232.246.0
70.84.211.0
69.93.226.0
69.57.142.0
69.20.104.0
69.18.148.0
69.162.79.0
68.177.102.0
67.227.172.0
67.225.206.0
67.192.135.0
67.19.34.0
67.15.231.0
67.15.103.0
67.134.208.0
66.77.70.0
66.249.17.0
66.223.50.0
65.55.240.0
65.55.184.0
65.175.38.0
64.78.182.0
64.66.190.0
64.41.151.0
64.41.142.0
64.246.4.0
64.202.189.0
64.13.134.0
64.128.133.0
63.85.36.0
62.75.216.0
62.75.163.0
62.213.110.0
62.189.194.0
62.146.66.0
62.146.210.0
62.14.249.0
38.113.1.0
217.174.103.0
217.170.21.0
217.16.16.0
217.106.234.0
216.99.133.0
216.55.183.0
216.49.94.0
216.49.88.0
216.246.90.0
216.239.122.0
216.12.145.0
216.10.192.0
213.31.172.0
213.220.100.0
213.198.89.0
213.171.218.0
213.133.34.0
212.8.79.0
212.72.62.0
212.67.88.0
212.47.219.0
209.87.209.0
209.62.68.0
209.62.112.0
209.51.167.0
209.216.46.0
209.160.22.0
209.157.69.0
209.124.55.0
208.79.250.0
207.66.0.0
207.46.232.0
207.46.20.0
207.46.18.0
207.44.154.0
206.204.52.0
205.227.136.0
205.178.145.0
204.14.90.0
203.160.188.0
199.203.243.0
198.6.49.0
195.70.37.0
195.64.225.0
195.55.72.0
195.210.42.0
195.2.240.0
195.146.235.0
195.137.160.0
194.33.180.0
194.206.126.0
194.112.106.0
194.109.142.0
194.0.200.0
193.71.68.0
193.69.114.0
193.66.251.0
193.24.237.0
193.193.194.0
193.17.85.0
193.110.109.0
193.1.193.0
193.0.6.0
192.150.94.0
188.93.8.0
18.85.2.0
166.70.98.0
165.160.15.0
162.40.10.0
155.35.248.0
150.70.93.0
149.101.225.0
141.202.248.0
139.91.222.0
128.130.60.0
128.130.56.0
128.111.48.0
sfc.dll
winlogon.exe
\\.\PhysicalDrive
smss.exe
csrss.exe
lsass.exe
%s\%s
%d.%d.%d.%d
route.exe -p add %s mask 255.255.255.0 %s
Software\Microsoft\Windows NT\CurrentVersion
%s!%s!X
SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command
[[[URL: %s
Process: %s
Referer: %s
User-Agent: %s
Title: %s]]]
ntdll.dll
keys
bssrepp\private.txt
bssrepp\keys
bssrepp\public.txt
keys.zip
\*.key
\self.cer
self.cer
path.txt
pass.log
ctunnel.exe
ctunnel.zip
path_ctunnel.txt
keylog.txt
links.log
Content-Disposition: form-data; name="file"; filename="report"
header.key
keys99
\header.key
masks2.key
\masks2.key
masks.key
\masks.key
name.key
\name.key
primary2.key
\primary2.key
primary.key
\primary.key
keys99.zip
path99.txt
user32.dll
prv_key.pfx
keys\
sign.cer
\History.IE5\index.dat
https
\Opera\Opera\typed_history.xml
secret.key
pubkeys.key
\\.\KmxAgent
\Windows Defender
MpClient.dll
____AVP.Root
avipc.dll
\AVG\AVG9\dfncfg.dat
\AVG\AVG9\dfmcfg.dat
kernel32.dll
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Hotfix\Q246009
Server 2003 for Itanium64
Server 2003 for AMD64
smime3.dll
nss3.dll
softokn3.dll
nssutil3.dll
sqlite3.dll
plc4.dll
plds4.dll
nspr4.dll
mozcrt19.dll
webmoney
PK11_ListCerts
CERT_DestroyCertList
CERT_GetDefaultCertDB
PORT_UCS2_UTF8Conversion
PORT_SetUCS2_ASCIIConversionFunction
PK11_GetInternalKeySlot
PK11_CheckUserPassword
SEC_PKCS12AddPasswordIntegrity
SEC_PKCS12CreatePasswordPrivSafe
SEC_PKCS12AddCertAndKey
SEC_PKCS12DestroyExportContext
SEC_PKCS12CreateExportContext
1234567890
firefox
\Mozilla\Firefox\profiles.ini
\Mozilla\Firefox\
balance.htm
Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
action=auth&np=&login=
IW_FormName=fmLogin&IW_FormClass=TfmLogin
opera.dll
HttpSendRequestA
HttpSendRequestW
Title: %s
User-agent: %s]]]
{{{%s}}}Kernel32.dll
\*.bk
ISClient.cfg
interpro.ini
rfk.zip
pass_
login=
password=
ws2_32.dll
Agava_Client.exe
KeysDiskPath
Agava_Client.ini
Agava_keys
keys_path.txt
path1.txt
inter.zip
cbsmain.dll
bsi.dll
vb_pfx_import
iexplore.exe|opera.exe|java.exe|javaw.exe|explorer.exe|isclient.exe|intpro.exe|mnp.exe|loadmain.exe
hXXp://
/knok.php?id=
hXXp://beautifumortimer.com/knok.php?id=
C:\temp_file_bin
login
software\microsoft\windows nt\currentversion\winlogon
SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
%d:TCP
%d:TCP:*:Enabled:%d
%Program Files%
services.exe
/socks.php?name=
&port=
iexplore.exe
java.exe
javaw.exe
javaws.exe
opera.exe
mnp.exe
explorer.exe
isclient.exe
intpro.exe
loadmain.exe
advapi32.dll
sks2xyz.dll
FilialRCon.dll
Wininet.dll
%Program Files%\Common Files\
WinExec
GetProcessHeap
GetSystemWindowsDirectoryA
RegOpenKeyExA
RegCreateKeyExA
RegFlushKey
RegCloseKey
RegOpenKeyA
CertOpenSystemStoreA
CertDeleteCertificateFromStore
PFXExportCertStoreEx
CertDuplicateCertificateContext
CertEnumCertificatesInStore
PFXImportCertStore
CertGetNameStringA
CertCloseStore
CertAddCertificateContextToStore
CertOpenStore
SHFileOperationA
URLDownloadToFileA
GetKeyboardState
GetKeyState
DeleteUrlCacheEntry
InternetOpenUrlA
6$6$6$6$6 6
.text
`.rdata
@.data
.reloc
KERNEL32.DLL
ADVAPI32.dll
CRYPT32.dll
IPHLPAPI.DLL
MSVCRT.dll
ole32.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
SHLWAPI.dll
urlmon.dll
USER32.dll
WININET.dll
WS2_32.dll
hXXps://light.wmtransfer.com/login.aspx?ReturnUrl=/default.aspx
btnLogin
lself.cer
\secrets.key
Explorer.EXE_1684_rwx_03171000_00001000:
Software\Policies\Microsoft\SystemCertificates\trust
%Documents and Settings%\%current user%\Application Data\Microsoft\SystemCertificates\My
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1988
- Delete the original Trojan file.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.