Generic.Malware.WVdld.6F5F0F96_41ade8caf6
Generic.Malware.WVdld.6F5F0F96 (BitDefender), TrojanDownloader:Win32/Small (Microsoft), Trojan-Downloader.Win32.Agent.udm (Kaspersky), Trojan.DownLoader4.40333 (DrWeb), Generic.Malware.WVdld.6F5F0F96 (B) (Emsisoft), Generic QHosts.a.gen (McAfee), Trojan.Gen.6 (Symantec), Trojan-Proxy.Win32.Ranky (Ikarus), Generic.Malware.WVdld.6F5F0F96 (FSecure), Win32:Evo-gen [Susp] (AVG), Win32:Evo-gen [Susp] (Avast), TROJ_AGENT.ATAG (TrendMicro), Generic.Malware.WVdld.6F5F0F96 (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-Proxy, Trojan, Worm, WormAutorun, Trojan-Proxy, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Requires JavaScript enabled! |
---|
MD5: 41ade8caf674f323e345c6a75bd85d13
SHA1: 0ffc462a3861f3795f6b6474af544d614dd90c58
SHA256: aef799343cb911d0c5414e35f5e2957cb35d21c54b33eb5bd5d390b4c4833cb6
SSDeep: 768:78QXvyTFpHrP/58ByHA/oEraNsNHPkUfb uTld9woHBX4QXsFwAbF1PGCwwtIa:BKFF358KAAErO4PrquZwor/4 Cf6
Size: 77984 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company: no certificate found
Created at: 1970-01-01 03:00:00
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.
Payload
Behaviour | Description |
---|---|
WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer. |
Trojan-Proxy | This program can launch a proxy server (SOCKS4) on a designated TCP port. |
Process activity
The Generic creates the following process(es):
%original file name%.exe:2452
The Generic injects its code into the following process(es):
csrss.exe:2096
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:2452 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
C:\mfxixue.bat (104 bytes)
C:\Windows\Tasks\csrss.exe (11028 bytes)
Registry activity
Dropped PE files
MD5 | File path |
---|---|
dead113140d0686a7d7feba99e884258 | c:\Boot\Fonts\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\cs-CZ\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\da-DK\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\de-DE\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\el-GR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\en-US\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\es-ES\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\fi-FI\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\fr-FR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\hu-HU\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\it-IT\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\ja-JP\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\ko-KR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\nb-NO\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\nl-NL\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\pl-PL\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\pt-BR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\pt-PT\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\ru-RU\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\sv-SE\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\tr-TR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\zh-CN\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\zh-HK\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\zh-TW\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\bin\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\IEExamples\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\PerlEx\benchmarks\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\PerlEx\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\Windows Script Components\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\Windows Script Host\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\aspSamples\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\cgi\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\fork\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\etc\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\Components\Windows\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\Components\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\bin\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\faq\Windows\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\faq\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\images\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActivePerl\DocTools\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActivePerl\PPM\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActivePerl\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\Config\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\PerlCritic\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\Tkx\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\Win32\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Algorithm\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\Prove\State\Result\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\Prove\State\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\Prove\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Archive\Tar\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Archive\Zip\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Archive\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Attribute\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\B\Lint\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\B\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bit\Vector\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bit\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bundle\DBD\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bundle\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\CGI\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Carp\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\Accessor\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\C3\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\Data\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\Load\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\Class\Immutable\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\Class\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\Method\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\Mixin\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Compress\Raw\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Compress\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\autodie\exception\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\autodie\wsock32.dll |
c8d4d9eccabd22a3d326f5ba3bb1cbd9 | c:\Windows\Tasks\csrss.exe |
dead113140d0686a7d7feba99e884258 | c:\Windows\Tasks\wsock32.dll |
c8d4d9eccabd22a3d326f5ba3bb1cbd9 | c:\Windows\Tasks\ÂÌ»¯.bat |
HOSTS file anomalies
The Generic modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 912 bytes in size. The following strings are added to the hosts file listed below:
127.0.0.1 | www.360.cn |
127.0.0.1 | www.360safe.cn |
127.0.0.1 | www.360safe.com |
127.0.0.1 | www.chinakv.com |
127.0.0.1 | www.rising.com.cn |
127.0.0.1 | rising.com.cn |
127.0.0.1 | dl.jiangmin.com |
127.0.0.1 | jiangmin.com |
127.0.0.1 | www.jiangmin.com |
127.0.0.1 | www.duba.net |
127.0.0.1 | www.eset.com.cn |
127.0.0.1 | www.nod32.com |
127.0.0.1 | shadu.duba.net |
127.0.0.1 | union.kingsoft.com |
127.0.0.1 | www.kaspersky.com.cn |
127.0.0.1 | kaspersky.com.cn |
127.0.0.1 | virustotal.com |
127.0.0.1 | www.kaspersky.com |
127.0.0.1 | 60.210.176.251 |
127.0.0.1 | www.cnnod32.cn |
127.0.0.1 | www.lanniao.org |
127.0.0.1 | www.nod32club.com |
127.0.0.1 | www.dswlab.com |
127.0.0.1 | bbs.sucop.com |
127.0.0.1 | www.virustotal.com |
127.0.0.1 | tool.ikaka.com |
127.0.0.0 | 360.qihoo.com |
127.0.0.1 | qihoo.com |
127.0.0.1 | www.qihoo.com |
127.0.0.1 | www.qihoo.cn |
127.0.0.1 | 124.40.51.17 |
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.
VersionInfo
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
MEW | 4096 | 73868 | 73888 | 3.40306 | b32597a5057e2da29663bfb23b2cf07e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
URL | IP |
---|---|
liquan.5tf.net | ![]() |
teredo.ipv6.microsoft.com | ![]() |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
The Generic connects to the servers at the folowing location(s):
TBAK.ex
del "%ss
mfxi@ue.balt
C%c@9HuHt
N^.un
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
hXXp://VVV.microsoft.com
autorun.inf
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\arps.com
%d.%d.%d.%d
1314520
5201314
12345678
password
at \\%s %d:%d %s
F:\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
mpr.dll
hXXp://liquan.5tf.net/22banghou.exe
hXXp://liquan.5tf.net/tudide.exe
%s?mac=%s&ver=2.2
windows config
\mfxixue.ini
%s -ep a "%s" %s
\WinRAR\Rar.exe
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 124.40.51.17
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 union.kingsoft.com
127.0.0.1 VVV.kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 VVV.chinakv.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
ntdll.dll
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%WinDir%
%s\%s
%s\*.*
\Tasks\wsock32.dll
\wsock32.dll
C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VjXLslufQV.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe
.data
.reloc
%s\%s.pif
getservbyport
socket(af:%d,type:%d,proto:%d) rc=%d
WSAAsyncSelect(s=%d,hWnd,wMsg=%d,lEvent=%ld),rc=%d
connect,ip=%s:%d socket=%d
WSAGetLastError %d
inet_addr(%s)
getsockname(addr:%s,port:%d)
gethostbyname(hostname:%s)
gethostbyname(hostname:%s,addr:%s)
gethostname(hostname:%s)
accept,ip=%s:%d socket=%d
WSASetLastError(%d)
WSARecvEx(len=%d,buf:%s)
WSSSh8
WinExec
KERNEL32.dll
USER32.dll
MSVCRT.dll
URLDownloadToFileA
urlmon.dll
wsock32.dll
rcmd
rexec
rresvport
WSAAsyncGetServByPort
GetWindowsDirectoryA
keybd_event
EnumChildWindows
ADVAPI32.dll
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
WININET.dll
InternetOpenUrlA
WS2_32.dll
.dat(
VCRT8A^
keyb
VCRT\E_
kernel32.dll
csrss.exe_2096_rwx_00401000_00001000:
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
csrss.exe_2096_rwx_00406000_00002000:
C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\VjXLslufQV.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:2452
- Delete the original Generic file.
- Delete or disinfect the following files created/modified by the Generic:
C:\mfxixue.bat (104 bytes)
C:\Windows\Tasks\csrss.exe (11028 bytes) - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.