Generic.Malware.WVdld.6F5F0F96_e21bf4581e

by malwarelabrobot on March 25th, 2018 in Malware Descriptions.

Generic.Malware.WVdld.6F5F0F96 (BitDefender), TrojanDownloader:Win32/Small (Microsoft), Trojan-Downloader.Win32.Agent.udm (Kaspersky), Trojan.DownLoader4.40333 (DrWeb), Generic.Malware.WVdld.6F5F0F96 (B) (Emsisoft), Generic QHosts.a.gen (McAfee), Trojan.Gen.6 (Symantec), Trojan-Proxy.Win32.Ranky (Ikarus), Generic.Malware.WVdld.6F5F0F96 (FSecure), Win32:Evo-gen [Susp] (AVG), Win32:Evo-gen [Susp] (Avast), TROJ_AGENT.ATAG (TrendMicro), Generic.Malware.WVdld.6F5F0F96 (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-Proxy, Trojan, Worm, WormAutorun, Trojan-Proxy, Malware


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: e21bf4581e155c31fae2b096700a1125
SHA1: e929634c685cff0e17f345ec3bad32e2840f3b22
SHA256: 78871b31deacfb527b6b7569e99795ac936ea97cb456f607313eb26a06b29c81
SSDeep: 768:78QXvyTFpHrP/58ByHA/oEraNsNHPkUfb uTld9woHBX4QXsFwAbF1PGCwwtIa:BKFF358KAAErO4PrquZwor/4 Cf6
Size: 78006 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company: Cloud Installer
Created at: 1970-01-01 03:00:00
Analyzed on: Windows7 SP1 32-bit


Summary:

Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.

Payload

Behaviour Description
WormAutorun A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.
Trojan-Proxy This program can launch a proxy server (SOCKS4) on a designated TCP port.


Process activity

The Generic creates the following process(es):

%original file name%.exe:3380

The Generic injects its code into the following process(es):

csrss.exe:4040

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:3380 makes changes in the file system.
The Generic creates and/or writes to the following file(s):

C:\mfxixue.bat (104 bytes)
C:\Windows\Tasks\csrss.exe (11028 bytes)

Registry activity

Dropped PE files

MD5 File path
dead113140d0686a7d7feba99e884258 c:\Boot\Fonts\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\cs-CZ\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\da-DK\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\de-DE\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\el-GR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\en-US\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\es-ES\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\fi-FI\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\fr-FR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\hu-HU\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\it-IT\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\ja-JP\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\ko-KR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\nb-NO\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\nl-NL\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\pl-PL\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\pt-BR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\pt-PT\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\ru-RU\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\sv-SE\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\tr-TR\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\zh-CN\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\zh-HK\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Boot\zh-TW\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\MSOCache\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\bin\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\IEExamples\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\PerlEx\benchmarks\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\PerlEx\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\Windows Script Components\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\Windows Script Host\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\aspSamples\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\cgi\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\fork\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\eg\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\etc\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\Components\Windows\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\Components\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\bin\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\faq\Windows\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\faq\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\images\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActivePerl\DocTools\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActivePerl\PPM\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActivePerl\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\Config\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\PerlCritic\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\Tkx\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\Win32\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\ActiveState\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Algorithm\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\Prove\State\Result\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\Prove\State\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\Prove\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\App\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Archive\Tar\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Archive\Zip\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Archive\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Attribute\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\B\Lint\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\B\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bit\Vector\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bit\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bundle\DBD\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Bundle\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\CGI\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Carp\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\Accessor\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\C3\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\Data\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\Load\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\Class\Immutable\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\Class\MOP\Class\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\autodie\exception\wsock32.dll
dead113140d0686a7d7feba99e884258 c:\Perl\html\lib\autodie\wsock32.dll
166f2b899b531b1783c40b8a290352c2 c:\Windows\Tasks\csrss.exe
dead113140d0686a7d7feba99e884258 c:\Windows\Tasks\wsock32.dll
166f2b899b531b1783c40b8a290352c2 c:\Windows\Tasks\ÂÌ»¯.bat

HOSTS file anomalies

The Generic modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 912 bytes in size. The following strings are added to the hosts file listed below:

127.0.0.1 www.360.cn
127.0.0.1 www.360safe.cn
127.0.0.1 www.360safe.com
127.0.0.1 www.chinakv.com
127.0.0.1 www.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
127.0.0.1 www.jiangmin.com
127.0.0.1 www.duba.net
127.0.0.1 www.eset.com.cn
127.0.0.1 www.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 union.kingsoft.com
127.0.0.1 www.kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 www.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 www.cnnod32.cn
127.0.0.1 www.lanniao.org
127.0.0.1 www.nod32club.com
127.0.0.1 www.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 www.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 www.qihoo.com
127.0.0.1 www.qihoo.cn
127.0.0.1 124.40.51.17


Rootkit activity

No anomalies have been detected.

Propagation

A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
MEW 4096 73868 73910 3.40306 b32597a5057e2da29663bfb23b2cf07e

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
liquan.5tf.net
teredo.ipv6.microsoft.com


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

The Generic connects to the servers at the folowing location(s):

csrss.exe_4040:

TBAK.ex
del "%ss
mfxi@ue.balt
C%c@9HuHt
N^.un
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
hXXp://VVV.microsoft.com
autorun.inf
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\arps.com
%d.%d.%d.%d
1314520
5201314
12345678
password
at \\%s %d:%d %s
F:\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
mpr.dll
hXXp://liquan.5tf.net/22banghou.exe
hXXp://liquan.5tf.net/tudide.exe
%s?mac=%s&ver=2.2
windows config
\mfxixue.ini
%s -ep a "%s" %s
\WinRAR\Rar.exe
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 124.40.51.17
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 union.kingsoft.com
127.0.0.1 VVV.kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 VVV.chinakv.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
ntdll.dll
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%WinDir%
%s\%s
%s\*.*
\Tasks\wsock32.dll
\wsock32.dll
C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\uq2hsuVb44.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe
.data
.reloc
%s\%s.pif
getservbyport
socket(af:%d,type:%d,proto:%d) rc=%d
WSAAsyncSelect(s=%d,hWnd,wMsg=%d,lEvent=%ld),rc=%d
connect,ip=%s:%d socket=%d
WSAGetLastError %d
inet_addr(%s)
getsockname(addr:%s,port:%d)
gethostbyname(hostname:%s)
gethostbyname(hostname:%s,addr:%s)
gethostname(hostname:%s)
accept,ip=%s:%d socket=%d
WSASetLastError(%d)
WSARecvEx(len=%d,buf:%s)
WSSSh8
WinExec
KERNEL32.dll
USER32.dll
MSVCRT.dll
URLDownloadToFileA
urlmon.dll
wsock32.dll
rcmd
rexec
rresvport
WSAAsyncGetServByPort
GetWindowsDirectoryA
keybd_event
EnumChildWindows
ADVAPI32.dll
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
WININET.dll
InternetOpenUrlA
WS2_32.dll
.dat(
VCRT8A^
keyb
VCRT\E_
kernel32.dll

csrss.exe_4040_rwx_00401000_00001000:

recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows

csrss.exe_4040_rwx_00406000_00002000:

C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\uq2hsuVb44.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    %original file name%.exe:3380

  2. Delete the original Generic file.
  3. Delete or disinfect the following files created/modified by the Generic:

    C:\mfxixue.bat (104 bytes)
    C:\Windows\Tasks\csrss.exe (11028 bytes)

  4. Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
    127.0.0.1 localhost
  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
  7. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now