Generic.Malware.WVdld.6F5F0F96_e21bf4581e
Generic.Malware.WVdld.6F5F0F96 (BitDefender), TrojanDownloader:Win32/Small (Microsoft), Trojan-Downloader.Win32.Agent.udm (Kaspersky), Trojan.DownLoader4.40333 (DrWeb), Generic.Malware.WVdld.6F5F0F96 (B) (Emsisoft), Generic QHosts.a.gen (McAfee), Trojan.Gen.6 (Symantec), Trojan-Proxy.Win32.Ranky (Ikarus), Generic.Malware.WVdld.6F5F0F96 (FSecure), Win32:Evo-gen [Susp] (AVG), Win32:Evo-gen [Susp] (Avast), TROJ_AGENT.ATAG (TrendMicro), Generic.Malware.WVdld.6F5F0F96 (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan-Downloader, Trojan-Proxy, Trojan, Worm, WormAutorun, Trojan-Proxy, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Requires JavaScript enabled! |
---|
MD5: e21bf4581e155c31fae2b096700a1125
SHA1: e929634c685cff0e17f345ec3bad32e2840f3b22
SHA256: 78871b31deacfb527b6b7569e99795ac936ea97cb456f607313eb26a06b29c81
SSDeep: 768:78QXvyTFpHrP/58ByHA/oEraNsNHPkUfb uTld9woHBX4QXsFwAbF1PGCwwtIa:BKFF358KAAErO4PrquZwor/4 Cf6
Size: 78006 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: MicrosoftVisualC, MicrosoftVisualCv50v60MFC, MicrosoftVisualC50, Armadillov171, UPolyXv05_v6
Company: Cloud Installer
Created at: 1970-01-01 03:00:00
Analyzed on: Windows7 SP1 32-bit
Summary:
Trojan-Downloader. Trojan program, which downloads files from the Internet without user's notice and executes them.
Payload
Behaviour | Description |
---|---|
WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer. |
Trojan-Proxy | This program can launch a proxy server (SOCKS4) on a designated TCP port. |
Process activity
The Generic creates the following process(es):
%original file name%.exe:3380
The Generic injects its code into the following process(es):
csrss.exe:4040
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process %original file name%.exe:3380 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
C:\mfxixue.bat (104 bytes)
C:\Windows\Tasks\csrss.exe (11028 bytes)
Registry activity
Dropped PE files
MD5 | File path |
---|---|
dead113140d0686a7d7feba99e884258 | c:\Boot\Fonts\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\cs-CZ\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\da-DK\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\de-DE\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\el-GR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\en-US\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\es-ES\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\fi-FI\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\fr-FR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\hu-HU\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\it-IT\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\ja-JP\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\ko-KR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\nb-NO\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\nl-NL\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\pl-PL\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\pt-BR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\pt-PT\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\ru-RU\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\sv-SE\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\tr-TR\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\zh-CN\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\zh-HK\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Boot\zh-TW\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\All Users\{91140000-0011-0000-0000-0000000FF1CE}-C\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\MSOCache\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\bin\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\IEExamples\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\PerlEx\benchmarks\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\PerlEx\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\Windows Script Components\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\Windows Script Host\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\aspSamples\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\cgi\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\fork\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\eg\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\etc\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\Components\Windows\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\Components\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\bin\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\faq\Windows\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\faq\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\images\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActivePerl\DocTools\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActivePerl\PPM\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActivePerl\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\Config\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\PerlCritic\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\Tkx\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\Win32\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\ActiveState\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Algorithm\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\Prove\State\Result\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\Prove\State\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\Prove\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\App\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Archive\Tar\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Archive\Zip\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Archive\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Attribute\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\B\Lint\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\B\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bit\Vector\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bit\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bundle\DBD\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Bundle\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\CGI\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Carp\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\Accessor\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\C3\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\Data\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\Load\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\Class\Immutable\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\Class\MOP\Class\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\autodie\exception\wsock32.dll |
dead113140d0686a7d7feba99e884258 | c:\Perl\html\lib\autodie\wsock32.dll |
166f2b899b531b1783c40b8a290352c2 | c:\Windows\Tasks\csrss.exe |
dead113140d0686a7d7feba99e884258 | c:\Windows\Tasks\wsock32.dll |
166f2b899b531b1783c40b8a290352c2 | c:\Windows\Tasks\ÂÌ»¯.bat |
HOSTS file anomalies
The Generic modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 912 bytes in size. The following strings are added to the hosts file listed below:
127.0.0.1 | www.360.cn |
127.0.0.1 | www.360safe.cn |
127.0.0.1 | www.360safe.com |
127.0.0.1 | www.chinakv.com |
127.0.0.1 | www.rising.com.cn |
127.0.0.1 | rising.com.cn |
127.0.0.1 | dl.jiangmin.com |
127.0.0.1 | jiangmin.com |
127.0.0.1 | www.jiangmin.com |
127.0.0.1 | www.duba.net |
127.0.0.1 | www.eset.com.cn |
127.0.0.1 | www.nod32.com |
127.0.0.1 | shadu.duba.net |
127.0.0.1 | union.kingsoft.com |
127.0.0.1 | www.kaspersky.com.cn |
127.0.0.1 | kaspersky.com.cn |
127.0.0.1 | virustotal.com |
127.0.0.1 | www.kaspersky.com |
127.0.0.1 | 60.210.176.251 |
127.0.0.1 | www.cnnod32.cn |
127.0.0.1 | www.lanniao.org |
127.0.0.1 | www.nod32club.com |
127.0.0.1 | www.dswlab.com |
127.0.0.1 | bbs.sucop.com |
127.0.0.1 | www.virustotal.com |
127.0.0.1 | tool.ikaka.com |
127.0.0.0 | 360.qihoo.com |
127.0.0.1 | qihoo.com |
127.0.0.1 | www.qihoo.com |
127.0.0.1 | www.qihoo.cn |
127.0.0.1 | 124.40.51.17 |
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.
VersionInfo
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
MEW | 4096 | 73868 | 73910 | 3.40306 | b32597a5057e2da29663bfb23b2cf07e |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
URL | IP |
---|---|
liquan.5tf.net | ![]() |
teredo.ipv6.microsoft.com | ![]() |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
The Generic connects to the servers at the folowing location(s):
TBAK.ex
del "%ss
mfxi@ue.balt
C%c@9HuHt
N^.un
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
hXXp://VVV.microsoft.com
autorun.inf
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\arps.com
%d.%d.%d.%d
1314520
5201314
12345678
password
at \\%s %d:%d %s
F:\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
mpr.dll
hXXp://liquan.5tf.net/22banghou.exe
hXXp://liquan.5tf.net/tudide.exe
%s?mac=%s&ver=2.2
windows config
\mfxixue.ini
%s -ep a "%s" %s
\WinRAR\Rar.exe
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 124.40.51.17
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 union.kingsoft.com
127.0.0.1 VVV.kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 VVV.chinakv.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
ntdll.dll
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%WinDir%
%s\%s
%s\*.*
\Tasks\wsock32.dll
\wsock32.dll
C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\uq2hsuVb44.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe
.data
.reloc
%s\%s.pif
getservbyport
socket(af:%d,type:%d,proto:%d) rc=%d
WSAAsyncSelect(s=%d,hWnd,wMsg=%d,lEvent=%ld),rc=%d
connect,ip=%s:%d socket=%d
WSAGetLastError %d
inet_addr(%s)
getsockname(addr:%s,port:%d)
gethostbyname(hostname:%s)
gethostbyname(hostname:%s,addr:%s)
gethostname(hostname:%s)
accept,ip=%s:%d socket=%d
WSASetLastError(%d)
WSARecvEx(len=%d,buf:%s)
WSSSh8
WinExec
KERNEL32.dll
USER32.dll
MSVCRT.dll
URLDownloadToFileA
urlmon.dll
wsock32.dll
rcmd
rexec
rresvport
WSAAsyncGetServByPort
GetWindowsDirectoryA
keybd_event
EnumChildWindows
ADVAPI32.dll
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
WININET.dll
InternetOpenUrlA
WS2_32.dll
.dat(
VCRT8A^
keyb
VCRT\E_
kernel32.dll
csrss.exe_4040_rwx_00401000_00001000:
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://liquan.5tf.net/arp.exe
hXXp://liquan.5tf.net/wincap.exe
hXXp://liquan.5tf.net/kk/ct.asp
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
csrss.exe_4040_rwx_00406000_00002000:
C:\Windows\system32\arps.com
C:\Windows\system32\wincap.exe
C:\Windows\system32
C:\Users\"%CurrentUserName%"\AppData\Local\Temp\uq2hsuVb44.pif
C:\Windows\Tasks\
C:\Windows\Tasks\csrss.exe
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:3380
- Delete the original Generic file.
- Delete or disinfect the following files created/modified by the Generic:
C:\mfxixue.bat (104 bytes)
C:\Windows\Tasks\csrss.exe (11028 bytes) - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
127.0.0.1 localhost - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.