Generic.Malware.WVdld.6F5F0F96_af0f6ff236

by malwarelabrobot on February 11th, 2018 in Malware Descriptions.

Generic.Malware.WVdld.6F5F0F96 (BitDefender), TrojanDownloader:Win32/Small (Microsoft), Trojan-Downloader.Win32.Agent.udm (Kaspersky), Trojan.DownLoader4.40333 (DrWeb), Generic.Malware.WVdld.6F5F0F96 (B) (Emsisoft), Generic QHosts.a.gen (McAfee), Trojan-Proxy.Win32.Ranky (Ikarus), Generic.Malware.WVdld.6F5F0F96 (FSecure), TROJ_AGENT.ATAG (TrendMicro), Generic.Malware.WVdld.6F5F0F96 (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-Proxy, Trojan, Worm, WormAutorun, Trojan-Proxy, Malware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: af0f6ff236a1baa5ff50dfbcd981e4c1
SHA1: b60abb511cf1d5b33214faef2ce6eef56c8ec36c
SHA256: 9577af1f3d43877375e89716f6f9654121e7483ba07a64e5bce79f87f9735079
SSDeep: 768:78QXvyTFpHrP/58ByHA/oEraNsNHPkUfb uTld9woHBX4QXsFwAbF1PGCwwtIa:BKFF358KAAErO4PrquZwor/4 Cf6
Size: 78067 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company:
Created at: 1970-01-01 03:00:00
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.

Payload

Behaviour Description
WormAutorun A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.
Trojan-Proxy This program can launch a proxy server (SOCKS4) on a designated TCP port.


Process activity

The Generic creates the following process(es):

%original file name%.exe:3708

The Generic injects its code into the following process(es):

csrss.exe:1064

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:3708 makes changes in the file system.
The Generic creates and/or writes to the following file(s):

C:\mfxixue.bat (104 bytes)
C:\Windows\Tasks\csrss.exe (11028 bytes)

Registry activity

Dropped PE files

MD5 File path
dead113140d0686a7d7feba99e884258 c:\Boot\Fonts\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\cs-CZ\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\da-DK\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\de-DE\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\el-GR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\en-US\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\es-ES\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\fi-FI\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\fr-FR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\hu-HU\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\it-IT\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\ja-JP\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\ko-KR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\nb-NO\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\nl-NL\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\pl-PL\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\pt-BR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\pt-PT\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\ru-RU\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\sv-SE\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\tr-TR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\zh-CN\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\zh-HK\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\zh-TW\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\bin\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\IEExamples\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\PerlEx\benchmarks\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\PerlEx\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\Windows Script Components\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\Windows Script Host\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\aspSamples\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\cgi\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\fork\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\etc\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\Components\Windows\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\Components\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\bin\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\faq\Windows\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\faq\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\images\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActivePerl\DocTools\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActivePerl\PPM\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActivePerl\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\Config\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\PerlCritic\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\Tkx\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\Win32\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Algorithm\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\Prove\State\Result\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\Prove\State\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\Prove\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Archive\Tar\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Archive\Zip\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Archive\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Attribute\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\B\Lint\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\B\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bit\Vector\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bit\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bundle\DBD\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bundle\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CGI\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Backend\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Config\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Dist\Build\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Dist\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Internals\Source\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Internals\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Module\Author\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Module\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Shell\Default\Plugins\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Shell\Default\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\Shell\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPANPLUS\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPAN\API\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPAN\Meta\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CPAN\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Carp\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\Accessor\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\C3\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\Data\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\Load\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\Class\Immutable\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\Class\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\Method\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\Mixin\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Compress\Raw\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Compress\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Config\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\File\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\Gofer\Policy\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\Gofer\Transport\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\Gofer\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\ODBC\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\Oracle\Troubleshooting\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\Oracle\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\SQLite\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBD\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\DBI\Const\GetInfo\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Data\Dump\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Data\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Date\Calc\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Date\Calendar\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Date\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\autodie\exception\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\autodie\wsock32.dll
918ecb7af77c84e693259ab67c2b4fde c:\Windows\Tasks\csrss.exe
dead113140d0686a7d7feba99e884258 c:\Windows\Tasks\wsock32.dll
918ecb7af77c84e693259ab67c2b4fde c:\Windows\Tasks\ÂÌ»¯.bat

HOSTS file anomalies

The Generic modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 912 bytes in size. The following strings are added to the hosts file listed below:

127.0.0.1 www.360.cn
127.0.0.1 www.360safe.cn
127.0.0.1 www.360safe.com
127.0.0.1 www.chinakv.com
127.0.0.1 www.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
127.0.0.1 www.jiangmin.com
127.0.0.1 www.duba.net
127.0.0.1 www.eset.com.cn
127.0.0.1 www.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 union.kingsoft.com
127.0.0.1 www.kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 www.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 www.cnnod32.cn
127.0.0.1 www.lanniao.org
127.0.0.1 www.nod32club.com
127.0.0.1 www.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 www.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 www.qihoo.com
127.0.0.1 www.qihoo.cn
127.0.0.1 124.40.51.17


Rootkit activity

No anomalies have been detected.

Propagation

A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
MEW 4096 73868 73971 3.40306 b32597a5057e2da29663bfb23b2cf07e

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
liquan.5tf.net
teredo.ipv6.microsoft.com


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

The Generic connects to the servers at the folowing location(s):

csrss.exe_1064:

TBAK.ex
del "%ss
mfxi@ue.balt
C%c@9HuHt
N^.un
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
hXXp://VVV.microsoft.com
autorun.inf
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\arps.com
%d.%d.%d.%d
1314520
5201314
12345678
password
at \\%s %d:%d %s
F:\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
mpr.dll
hXXp://liquan.5tf.net/22banghou.exe
hXXp://liquan.5tf.net/tudide.exe
%s?mac=%s&ver=2.2
windows config
\mfxixue.ini
%s -ep a "%s" %s
\WinRAR\Rar.exe
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 124.40.51.17
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 union.kingsoft.com
127.0.0.1 VVV.kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 VVV.chinakv.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
ntdll.dll
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%WinDir%
%s\%s
%s\*.*
\Tasks\wsock32.dll
\wsock32.dll
C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\OPZ3fqOiM1.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe
.data
.reloc
%s\%s.pif
getservbyport
socket(af:%d,type:%d,proto:%d) rc=%d
WSAAsyncSelect(s=%d,hWnd,wMsg=%d,lEvent=%ld),rc=%d
connect,ip=%s:%d socket=%d
WSAGetLastError %d
inet_addr(%s)
getsockname(addr:%s,port:%d)
gethostbyname(hostname:%s)
gethostbyname(hostname:%s,addr:%s)
gethostname(hostname:%s)
accept,ip=%s:%d socket=%d
WSASetLastError(%d)
WSARecvEx(len=%d,buf:%s)
WSSSh8
WinExec
KERNEL32.dll
USER32.dll
MSVCRT.dll
URLDownloadToFileA
urlmon.dll
wsock32.dll
rcmd
rexec
rresvport
WSAAsyncGetServByPort
GetWindowsDirectoryA
keybd_event
EnumChildWindows
ADVAPI32.dll
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
WININET.dll
InternetOpenUrlA
WS2_32.dll
.dat(
VCRT8A^
keyb
VCRT\E_
kernel32.dll

csrss.exe_1064_rwx_00401000_00001000:

recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows

csrss.exe_1064_rwx_00406000_00002000:

C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\OPZ3fqOiM1.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:3708

  2. Delete the original Generic file.
  3. Delete or disinfect the following files created/modified by the Generic:

    C:\mfxixue.bat (104 bytes)
    C:\Windows\Tasks\csrss.exe (11028 bytes)

  4. Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
    127.0.0.1 localhost
  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
  7. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now