Gen.Worm.Zomon.1_f7c1e52c5c
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Worm.Zomon.1 (B) (Emsisoft), Gen:Worm.Zomon.1 (AdAware), Trojan-Downloader.Win32.Torcohost.FD, Trojan-PSW.Win32.Zbot.6.FD, GenericInjector.YR, GenericIRCBot.YR, PUPTorClient.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-PSW, Trojan, Worm, PUP, IRCBot
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: f7c1e52c5cfdba9eacf3f7131bc99e63
SHA1: 5278bf4b0bc7c8bfb4e4b1a58949657eca0c1b0f
SHA256: 01ed220121c5dfdef7d568941148e278a2cbc054d1d4cad3131d17a10a4ac484
SSDeep: 196608:CDYPAGw9kdrJJ5wmAsVqEXMSS7al8upA9/XwFsvrkl7sy:/AMbAsZcJal8ua9/XwFDb
Size: 9064448 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: MicrosoftVisualCv71EXE, MicrosoftVisualCv70, UPolyXv05_v6
Company: Fusion Install
Created at: 2010-06-29 05:50:42
Analyzed on: WindowsXPESX SP3 32-bit
Summary:
Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.
Payload
| Behaviour | Description |
|---|---|
| IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The Trojan creates the following process(es):
ivvi.exe:212
%original file name%.exe:132
The Trojan injects its code into the following process(es):
No processes have been created.
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
No files have been created.
Registry activity
The process ivvi.exe:212 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EF FB 2A 4B B1 FC 18 37 48 B6 BC 76 CC 07 23 FE"
The process %original file name%.exe:132 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "77 C3 88 C7 54 DB 2C C4 2B 9D 4D 95 AE 68 65 CE"
Dropped PE files
There are no dropped PE files.
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 3747844 | 3751936 | 4.10468 | 5ea41704e4657ddbea98d21edaba7da5 |
| .rdata | 3756032 | 10108 | 12288 | 3.14509 | 100ce06d83033b24a33b62b596af2c05 |
| .data | 3768320 | 6136 | 4096 | 2.75562 | 39c091e30c45befea896ae6cdae13fc9 |
| .rsrc | 3776512 | 30560 | 32768 | 3.71935 | b769571883dd4c311c4d37abe4358702 |
| .reloc | 3809280 | 12768 | 16384 | 1.60539 | 60f980569ac689c16a3e4b4d1b54f861 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://checkip.dyndns.com/ | |
| hxxp://checkip.dyndns.org/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET POLICY DynDNS CheckIp External IP Address Server Response
ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 222
Traffic
Web Traffic was not found.
The Trojan connects to the servers at the folowing location(s):
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
ivvi.exe:212
%original file name%.exe:132 - Delete the original Trojan file.
- Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.