Shiz_b19171daa6
HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Win32.Generic!SB.0 (VIPRE), Win32.SuspectCrc!IK (Emsisoft), Backdoor.Win32.Shiz.FD, Shiz.YR, GenericInjector.YR, BackdoorCaphaw_QKKBAL.YR (Lavasoft MAS)
Behaviour: Trojan, Backdoor
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
MD5: b19171daa6f4602db826c9c4bd9d2fe5
SHA1: d254c17c02ae51ac02ce2ff286bad9667593ca54
SHA256: 8018e517bebbe285b9733d5f5f7e0ad92771d58ddc69e27d8b3e005fa8a9bf04
SSDeep: 6144:7CJJfPjU62d rvBQ3QYlaBOkIoaz3UelJMg15r2b:42WiV5qOEIGS5k
Size: 259264 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: BorlandDelphi30, UPolyXv05_v6
Company: no certificate found
Created at: 2004-12-05 00:04:27
Summary:
Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
b19171daa6f4602db826c9c4bd9d2fe5.exe:2612
The Trojan injects its code into the following process(es):
ctfmon.exe:252
File activity
The process b19171daa6f4602db826c9c4bd9d2fe5.exe:2612 makes changes in a file system.
The Trojan creates and/or writes to the following file(s):
%WinDir%\AppPatch\ilrdhtg.exe (1799 bytes)
%System%\config\software (3028 bytes)
%System%\config\software.LOG (5300 bytes)
The Trojan deletes the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\1.tmp (0 bytes)
Registry activity
The process b19171daa6f4602db826c9c4bd9d2fe5.exe:2612 makes changes in a system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG] The process ctfmon.exe:252 makes changes in a system registry. [HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders] Network activity (URLs) Rootkit activity The Trojan installs the following user-mode hooks in CRYPT32.dll: CertVerifyCertificateChainPolicy The Trojan installs the following user-mode hooks in WININET.dll: HttpSendRequestExW The Trojan installs the following user-mode hooks in USER32.dll: GetWindowTextA The Trojan installs the following user-mode hooks in ADVAPI32.dll: CryptEncrypt The Trojan installs the following user-mode hooks in WS2_32.dll: WSASend The Trojan installs the following user-mode hooks in kernel32.dll: CreateFileW Propagation
"Seed" = "E6 4A 8F D8 6D F1 13 7B 75 5F 28 75 D1 A0 32 C4"
[HKLM\System\CurrentControlSet\Control\Session Manager]
"PendingFileRenameOperations" = "\??\%WinDir%\apppatch\ilrdhtg.exe_, \??\%WinDir%\apppatch\ilrdhtg.exe"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"d8cc41db" = "ÂCêkæÚ`Ã¥D 5õÔPÃ¥EK ao.)Üà â€Â¸a4d‚\yìqÂA}(Äé¼ü4|Âá@â€Â°â„¢,¡¤üHrѼ©€©â€Â´D0}éiXª¸|Èy4¡RYÑúiÂèmѩȄIáØð±¼(¤ ádI򯬓dËœ XYâÀeÅ“iü¥AÅ¡Ii¸rÂ¥(¡A\y 9€éñ$ZÔaxÙ9
The Trojan creates and/or sets the following values in system registry:
"AppData" = "%Documents and Settings%\%current user%\Application Data"
URL
IP
hxxp://cihunemyror.eu/login.php
50.116.56.144
hxxp://kefuwidijyp.eu/login.php (ET CNC Zeus/Spyeye/Palevo Tracker Reported CnC Server (group 3) , Malicious)
173.230.133.99
hxxp://galokusemus.eu/login.php
50.116.32.177
hxxp://jewuqyjywyv.eu/login.php (ET TROJAN Known Sinkhole Response Header , Malicious)
166.78.144.80
hxxp://digivehusyd.eu/login.php
96.43.141.186
jefapexytar.eu
50.116.56.144
fokyxazolar.eu
50.116.56.144
xuqohyxeqak.eu
50.116.56.144
lyruxyxaxaw.eu
50.116.56.144
gadufiwabim.eu
50.116.56.144
www.bing.com
204.79.197.200
foxivusozuc.eu
50.116.56.144
ryqecolijet.eu
50.116.56.144
gahihezenal.eu
Unresolvable
puregivytoh.eu
Unresolvable
nofyjikoxex.eu
Unresolvable
tuwikypabud.eu
Unresolvable
qegytuvufoq.eu
Unresolvable
kepymexihak.eu
Unresolvable
vojacikigep.eu
Unresolvable
makagucyraj.eu
Unresolvable
xuxusujenes.eu
Unresolvable
tucyguqaciq.eu
Unresolvable
lymylorozig.eu
Unresolvable
jepororyrih.eu
Unresolvable
xubifaremin.eu
Unresolvable
nozoxucavaq.eu
Unresolvable
dimutobihom.eu
Unresolvable
voniqofolyt.eu
Unresolvable
puvopalywet.eu
Unresolvable
ciliqikytec.eu
Unresolvable
tunujolavez.eu
Unresolvable
xutekidywyp.eu
Unresolvable
dikoniwudim.eu
Unresolvable
fogeliwokih.eu
Unresolvable
dixemazufel.eu
Unresolvable
divywysigud.eu
Unresolvable
lyvejujolec.eu
Unresolvable
puzutuqeqij.eu
Unresolvable
fobonobaxog.eu
Unresolvable
qederepuduf.eu
Unresolvable
rydinivoloh.eu
Unresolvable
kemocujufys.eu
Unresolvable
lysovidacyx.eu
Unresolvable
nojuletacuf.eu
Unresolvable
qeqinuqypoq.eu
Unresolvable
magofetequb.eu
Unresolvable
tupazivenom.eu
Unresolvable
marytymenok.eu
Unresolvable
rynazuqihoj.eu
Unresolvable
jejedudupuc.eu
Unresolvable
rytuvepokuv.eu
Unresolvable
volebatijub.eu
Unresolvable
ciqydofudyx.eu
Unresolvable
vofozymufok.eu
Unresolvable
cinepycusaw.eu
Unresolvable
keraborigin.eu
Unresolvable
qetoqolusex.eu
Unresolvable
pumadypyruv.eu
Unresolvable
nopegymozow.eu
Unresolvable
masisokemep.eu
Unresolvable
gatedyhavyd.eu
Unresolvable
fodakyhijyv.eu
Unresolvable
cicaratupig.eu
Unresolvable
vocumucokaj.eu
Unresolvable
HttpSendRequestExA
InternetReadFileExA
InternetReadFileExW
HttpSendRequestA
HttpSendRequestW
InternetQueryDataAvailable
InternetCloseHandle
InternetReadFile
GetClipboardData
SendInput
GetMessageA
GetMessageW
TranslateMessage
recv
gethostbyname
WSARecv
send
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
b19171daa6f4602db826c9c4bd9d2fe5.exe:2612
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%WinDir%\AppPatch\ilrdhtg.exe (1799 bytes)
%System%\config\software (3028 bytes)
%System%\config\software.LOG (5300 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.