Gen.Variant.Zusy.79585_bd7f21379d
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Zusy.79585 (B) (Emsisoft), Gen:Variant.Zusy.79585 (AdAware), GenericEmailWorm.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, EmailWorm
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: bd7f21379dba52bf8aae436fa94a3cba
SHA1: a62427fc4b1ac89622c20f70bddb7b33ac4416f0
SHA256: 2d2bdb59087fe20ce70a124d28d3458f176bb7edb29c4a5539cafd5228d8bdba
SSDeep: 12288:YUkpLRfcW/dEWP3GxtJw4MSIpIxpTrjl3I6:4p6Wl33MtS0IpCTNb
Size: 514560 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2014-01-15 11:06:55
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
| Behaviour | Description |
|---|---|
| EmailWorm | Worm can send e-mails. |
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1004
SG5CRKXUBBCVSQK:1396
The Trojan injects its code into the following process(es):
JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE:1460
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:1004 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE (263 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SG5CRKXUBBCVSQKOE2BMMWPRYPRWJPDP..EXE (211 bytes)
The process SG5CRKXUBBCVSQK:1396 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\G4QFR48K\gg_cs[1].exe (10204 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\7UOZ9KG1\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\G4QFR48K\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\24LW2SBA\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ULHU50E0\desktop.ini (67 bytes)
Registry activity
The process %original file name%.exe:1004 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC 72 6E DB E0 CE 98 7C 68 D8 D0 53 32 13 A0 3B"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE" = "Counter Strike Private Tool"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"SG5CRKXUBBCVSQKOE2BMMWPRYPRWJPDP..EXE" = "SG5CRKXUBBCVSQKOE2BMMWPRYPRWJPDP."
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process SG5CRKXUBBCVSQK:1396 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "BE BD D7 8F F6 3C 34 FF 23 E4 6F D2 EF E7 E2 95"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE:1460 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC E6 CB CC 01 85 D7 DD F7 08 EB 35 DF CE 95 11"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
Dropped PE files
| MD5 | File path |
|---|---|
| 8f078c90d857969d4a11b7d8826a432a | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE |
| 3ac9fdee0050a1f88be1f0e1f2608bce | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\SG5CRKXUBBCVSQKOE2BMMWPRYPRWJPDP..EXE |
| 0fafdd31665a1408948bf8326dc139de | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temporary Internet Files\Content.IE5\G4QFR48K\gg_cs[1].exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 26860 | 27136 | 4.29791 | ab9512ee7c9f5ad72ae20fba64a6341e |
| .itext | 32768 | 776 | 1024 | 3.22992 | c79df70a8b89425189a65adf4e08a6b8 |
| .data | 36864 | 2040 | 2048 | 0.904367 | 240816d5b34f6e1e38eab9c91fbec05d |
| .bss | 40960 | 11172 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .idata | 53248 | 2246 | 2560 | 2.90066 | 4b57ef8451a1099532bf2707e4ad39e3 |
| .tls | 57344 | 8 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| .rdata | 61440 | 24 | 512 | 0.14174 | 15b26e576cc064822312d1c66bb6f693 |
| .reloc | 65536 | 3612 | 4096 | 4.20936 | 92c609bf93bf264697ab3000df42f30f |
| .rsrc | 69632 | 475716 | 476160 | 5.31931 | 76787f6f6d3e0e84a26b3d379ac5023e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://steamcommunity.com/ | |
| hxxp://steamcommunity.com/profiles/ | |
| hxxp://steamcommunity.com/tradeoffer/new/?partner=196831820&token=hxxp://steamcommunity.com/tradeoffer/new/?partner=196831820&token=ZcqoeJK3 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET / HTTP/1.1
Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8
Origin: hXXp://steamcommunity.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.3; en-US; Valve Steam Client/1393366296; ) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.166 Safari/535.19
Referer: hXXp://steamcommunity.com/
Accept-Encoding: gzip,deflate,gzip, deflate
Accept-Language: en-us,en
Accept-Charset: iso-8859-1,*,utf-8
Host: steamcommunity.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: Apache
Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' hXXp://steamcommunity-a.akamaihd.net/ hXXps://api.steampowered.com/ hXXp://VVV.google-analytics.com hXXps://ssl.google-analytics.com hXXps://VVV.google.com hXXps://VVV.gstatic.com hXXps://apis.google.com; object-src 'none'; connect-src 'self' hXXps://steamcommunity.com hXXp://steamcommunity.com hXXps://api.steampowered.com/; frame-src 'self' hXXp://store.steampowered.com/ hXXps://store.steampowered.com/ hXXp://VVV.youtube.com hXXps://VVV.youtube.com hXXps://VVV.google.com;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache
X-NotLoggedIn: true
Content-Encoding: gzip
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 4676
Accept-Ranges: bytes
X-Varnish: 505566921
Date: Fri, 27 Mar 2015 14:20:20 GMT
Connection: keep-alive
Set-Cookie: sessionid=f058027bc282977b3e6143b1; path=/
Set-Cookie: steamCC_37_57_16_189=UA; expires=Fri, 27-Mar-2015 15:20:20 GMT; path=/...........<.W.8.?.s..A....s.8.B..z..J.R...e..#.rb.-W...o....#.. di
...!.....43..........D.....N.I... ;o_..A.HK.K.....M.ID...Y..omK.[a....
.a..h.<?,mZ.Vpb"0JpL..K.=..".I.....,.....\.0#..E...8...Q.D. .p.}..8
..7...G.. .`"..............E.""..Ap..ewl.,.Dar......Q&.L............|/
./.I...0.]b...8{.FO....m...Q/.2..1.{~9!.N37.=....o{..1.a.;.'.../......
...\.....Q.#.{...2..0.B.O~..n&..1X..............~t..uqd.h.....E.......
D@.....;.3vB.....c...!.8M{.k..lV..q...w....~.&N......!.F.~.y......z...
.........T/N.;.//....Gcb.xCnN..u.}._>........{.w....o...LG...W...V.
...rv.sMU....$. .%..............>..]...u..8...f..v....n.Zn....4.b}.
;.........P ..CC.`/.h.m.f.aB|.P..O.;.a.NO..q...I..B..o..m........g4..y
......w}F.G..9..."...B.&.s9..#!s.%#l.....r.&..!?<.|.n.i..g.b.....4.
aj.H....q.}..G........]....]~<s....._..6.~/.^N(.H../..m?....f......
.=m.U.^......BOec...&.0...R.7.g.....,.......!K"c..CV...B........&..}..
dW.f. .kN..&S.w.`}.Yyuy6I. ....PW..>.F..............5.w..:.....?.v.
..B..... ...^P.>.J.bo.4.}...?^6.......2E.D!q......$....$ad .0....k.
.....;<.U6...)*....4r.g....7...... 7..).... 7.._.<>...|.P.3.t
..0.......nC.| .......p".<.f.X}.V?....f.U..,UW.|6ox.p.......Jy..q..
.4.............'rZ.#.....[...Q(S.2 "g...r..r6x2.|Y.I..Hn.~..u........2
S....aO.N..........R.4}f.H8.......<...$^....A..Y.VY.S..5O..8..a.#..
W..ok....pbtqY...t...U...0..W..l .....Mk.R...*j.V......z4B/...r..U..
..u0..>..u.......Np4......mX...n.[...u.0....s.=.1.o...........R....
.\...2.....W...Lz.c.YYyp.h6*t.......y..~p"..V).\...'.......{>x.<<< skipped >>>
GET /profiles/ HTTP/1.1
Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8
Origin: hXXp://steamcommunity.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.3; en-US; Valve Steam Client/1393366296; ) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.166 Safari/535.19
Referer: hXXp://steamcommunity.com/
Accept-Encoding: gzip,deflate,gzip, deflate
Accept-Language: en-us,en
Accept-Charset: iso-8859-1,*,utf-8
Host: steamcommunity.com
Cookie: sessionid=f058027bc282977b3e6143b1; steamCC_37_57_16_189=UA
HTTP/1.1 200 OK
Server: Apache
Content-Security-Policy: script-src 'self' 'unsafe-inline' 'unsafe-eval' hXXp://steamcommunity-a.akamaihd.net/ hXXps://api.steampowered.com/ hXXp://VVV.google-analytics.com hXXps://ssl.google-analytics.com hXXps://VVV.google.com hXXps://VVV.gstatic.com hXXps://apis.google.com; object-src 'none'; connect-src 'self' hXXps://steamcommunity.com hXXp://steamcommunity.com hXXps://api.steampowered.com/; frame-src 'self' hXXp://store.steampowered.com/ hXXps://store.steampowered.com/ hXXp://VVV.youtube.com hXXps://VVV.youtube.com hXXps://VVV.google.com;
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache
X-NotLoggedIn: true
Content-Encoding: gzip
Vary: Accept-Encoding
Content-Type: text/html; charset=UTF-8
Content-Length: 2252
Accept-Ranges: bytes
X-Varnish: 505571375
Date: Fri, 27 Mar 2015 14:20:20 GMT
Connection: keep-alive...........X.s........ <.N.6v^Ph.0m(.R.M.3LF.e[.m.I......H....,...v
cI....;GG.....h....=..8F....OG.j.....u.N.....j........'.{tb! .2.s..,..
.0...37.i.s...q..X.?n..9.Kp.~_.M...n...]....$.ds....|3.X.|..`..1......
Q...\eFR...X....K.".r.........f....] N..%b.._HD...bN....x.....B.0.,...
...F.]Y1....r.......8.4...H7/......$p}!..I..3..t`.`1x....gN..G... .eBD
L....0...............R....._._...8....... .7....3......`</:..qy....
q.~.oqA.Y..........&.=;......'[email protected]........{_.^>.o..u.P....>
...S..Y>n.....9...../........[ .9g.).......<.....EeQF.....F...0?
./.V.w....H`....J....v...P2 Y.P.......!...Q...D...B.w........QQ_......
...........cA..^l..9)...K...... '..wB....".X"i^..Fsr&O.W...zq\...M....
....S...............d.......v...QCk..=..<A7..f..Hk....M5...i..p...U
s....(`~.B.tJN%i K......B4......&^S...;.q..U...p..e...<..a...:zwz9L
S......:..>......OBw....h....C..1x....j.........J....L.;.>?hv...
.[w.5........3!gX...rz....B.... [email protected](...u; >...R].....?..
*m(b...P.C.G.Z..n.4^.....V.;u...%...)t..JJ..obG...x...%...V...m.?.d#,2
_u..`)....0...e}N .G.Q..m^..........W..."....U.....a...S.[qZ..h..)a>
;V`.}..,A.P%[email protected].%............x........QDd..q......d.....
}$T......C3A.<$!.....$t..l...Q`..&..`.~}[email protected]".H ...}..`..,d....P
=P........f...u.w?..D.....'...<..c`.T..^...eD.<..Y..qc ..h.<}
......{....w.u...z]r...zm.odU.hI.Nj....d../hF .>a.......#u...o.U...
....f. .C.Y..&..Q~kitkL........9.YuJ5..v.8J..6.gU7k!...t..._..\...)...
U......^.h..re...S......5....ti".@.\....V}..%.X..>..}..,..v.j..<<< skipped >>>
GET /tradeoffer/new/?partner=196831820&token=hXXp://steamcommunity.com/tradeoffer/new/?partner=196831820&token=ZcqoeJK3 HTTP/1.1
Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8
Origin: hXXp://steamcommunity.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.3; en-US; Valve Steam Client/1393366296; ) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.166 Safari/535.19
Accept-Encoding: gzip,deflate,gzip, deflate,gzip, deflate
Accept-Language: en-us,en
Accept-Charset: iso-8859-1,*,utf-8
Host: steamcommunity.com
Cookie: sessionid=f058027bc282977b3e6143b1; steamCC_37_57_16_189=UA; webTradeEligibility={"allowed":1,"allowed_at_time":0,"steamguard_required_days":15,"sales_this_year":0,"max_sales_per_year":200,"forms_requested":0,"new_device_cooldown_days":7,"expiration":1427466053}
HTTP/1.1 302 Moved Temporarily
Server: Apache
Location: hXXps://steamcommunity.com/tradeoffer/new/?partner=196831820&token=hXXp://steamcommunity.com/tradeoffer/new/?partner=196831820&token=ZcqoeJK3
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Type: text/html
Content-Length: 20
Accept-Ranges: bytes
X-Varnish: 480029976
Date: Fri, 27 Mar 2015 14:20:23 GMT
Connection: keep-alive....................HTTP/1.1 302 Moved Temporarily..Server: Apache..Lo
cation: hXXps://steamcommunity.com/tradeoffer/new/?partner=196831820&t
oken=hXXp://steamcommunity.com/tradeoffer/new/?partner=196831820&token
=ZcqoeJK3..Vary: Accept-Encoding..Content-Encoding: gzip..Content-Type
: text/html..Content-Length: 20..Accept-Ranges: bytes..X-Varnish: 4800
29976..Date: Fri, 27 Mar 2015 14:20:23 GMT..Connection: keep-alive....
......................
GET /tradeoffer/new/?partner=196831820&token=hXXp://steamcommunity.com/tradeoffer/new/?partner=196831820&token=ZcqoeJK3 HTTP/1.1
Accept: text/html,application/xhtml xml,application/xml;q=0.9,*/*;q=0.8
Origin: hXXp://steamcommunity.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.3; en-US; Valve Steam Client/1393366296; ) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.166 Safari/535.19
Accept-Encoding: gzip,deflate,gzip, deflate,gzip, deflate
Accept-Language: en-us,en
Accept-Charset: iso-8859-1,*,utf-8
Host: steamcommunity.com
Cookie: sessionid=f058027bc282977b3e6143b1; steamCC_37_57_16_189=UA; webTradeEligibility={"allowed":1,"allowed_at_time":0,"steamguard_required_days":15,"sales_this_year":0,"max_sales_per_year":200,"forms_requested":0,"new_device_cooldown_days":7,"expiration":1427466055}
HTTP/1.1 302 Moved Temporarily
Server: Apache
Location: hXXps://steamcommunity.com/tradeoffer/new/?partner=196831820&token=hXXp://steamcommunity.com/tradeoffer/new/?partner=196831820&token=ZcqoeJK3
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Type: text/html
Content-Length: 20
Accept-Ranges: bytes
X-Varnish: 3970185674
Date: Fri, 27 Mar 2015 14:20:25 GMT
Connection: keep-alive....................HTTP/1.1 302 Moved Temporarily..Server: Apache..Lo
cation: hXXps://steamcommunity.com/tradeoffer/new/?partner=196831820&t
oken=hXXp://steamcommunity.com/tradeoffer/new/?partner=196831820&token
=ZcqoeJK3..Vary: Accept-Encoding..Content-Encoding: gzip..Content-Type
: text/html..Content-Length: 20..Accept-Ranges: bytes..X-Varnish: 3970
185674..Date: Fri, 27 Mar 2015 14:20:25 GMT..Connection: keep-alive...
.....................
The Trojan connects to the servers at the folowing location(s):
X l.dlT
JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE_1460_rwx_0040E000_00001000:
ntdll.dll
v2.0.50727
SG5CRKXUBBCVSQKOE2BMMWPRYPRWJPDP..EXE_1396:
.code
`.text
`.rdata
@.data
.rsrc
u&SSh2
tCPW
t.SQP
1.5.12
HEAD /%s HTTP/1.1
Host: %s
ws2_32.dll
WindowClass_%d
PB_Hotkey
uxtheme.dll
COMCTL32.DLL
msimg32.dll
InitOnceExecuteOnce
Kernel32.dll
1.2.5
libpng version 1.5.12 - July 11, 2012 Copyright (c) 1998-2012 Glenn Randers-Pehrson Copyright (c) 1996-1997 Andreas Dilger Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.
libpng version 1.5.12 - July 11, 2012
123456789
libpng warning: %s
libpng error: %s
libpng does not support gamma background rgb_to_gray
00003333
inflate 1.2.5 Copyright 1995-2010 Mark Adler
gg_cs.exe
hXXp://VVV.iammaddog.ru/mywork/csgo/gg_cs.exe
$".Dt
%f\KM
HKEY_CLASSES_ROOT\
Windows 95
Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.
Windows 98
ADVAPI32.DLL
HKEY_CLASSES_ROOT\Applications\
CreatePipe failed. Error:
HKEY_LOCAL_MACHINE
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\
Windows Server 2003
KEYBOARD,DISABLE
Windows Server 2008
HKEY_LOCAL_MACHINE\SOFTWARE\Novell\NetWareWorkstation\CurrentVersion
Software\Classes\PureBasic.exe\shell\open\command
HKEY_CLASSES_ROOT\.
user32.dll
X-Mailer: eSMTP 1.0
Windows Vista
Portuguese
Applications\PureBasic.exe\shell\open\command
HKEY_LOCAL_MACHINE\Software\Classes\.
PSAPI.DLL
Netapi32.dll
\compilers\PBcompiler.exe
Windows 2000
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
CryptDeriveKey_() failed
Version.dll
Windows NT 3.51
Port
HKEY_CLASSES_ROOT
Windows Me
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.
Windows 7
Ý/%mm/%yyyy @ %hh:%ii:%ss
RunDll32.exe
HKEY_USERS
shell32.dll
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Session Manager\Environment
AUTH LOGIN
Windows NT4
HKEY_LOCAL_MACHINE\Network\Novell\System Config\Install\Client Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Print\Printers\
HKEY_CLASSES_ROOT\Applications\PureBasic.exe\shell\open\command
HKEY_CURRENT_CONFIG
Windows XP
HKEY_CURRENT_USER
unable to call IWbemServices::ExecQuery
Ý/%mm/%yy %hh:%ii:%ss
NetUserChangePassword
HKEY_LOCAL_MACHINE\Software\Classes\
MSVCRT.dll
KERNEL32.dll
EnumWindows
MsgWaitForMultipleObjects
EnumChildWindows
GetKeyState
USER32.DLL
GDI32.DLL
OLE32.DLL
SHELL32.DLL
InternetOpenUrlA
HttpQueryInfoA
WININET.DLL
WSOCK32.DLL
WINMM.DLL
23456789
version="1.0.0.0"
name="CompanyName.ProductName.YourApp"
name="Microsoft.Windows.Common-Controls"
version="6.0.0.0"
publicKeyToken="6595b64144ccf1df"
<requestedExecutionLevel
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1004
SG5CRKXUBBCVSQK:1396 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temp\JGFQBXKI56QPH7S9TQDASMFSNGPKPEMF..EXE (263 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\SG5CRKXUBBCVSQKOE2BMMWPRYPRWJPDP..EXE (211 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\G4QFR48K\gg_cs[1].exe (10204 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\7UOZ9KG1\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\G4QFR48K\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\24LW2SBA\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\ULHU50E0\desktop.ini (67 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.