6f8393d4e1d0c9b23a44bc1c04633bcd
Jump to navigation
Jump to search
Description
Summary
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Identification
MD5 | 6f8393d4e1d0c9b23a44bc1c04633bcd |
---|---|
SHA1 | 4a644dc1036aaf9ffe56d9802a3abd671509f307 |
SHA256 | a6dd12e7a4fdd679b4a165bb9a9f0e7ef11514d828996484498b73d6e4835082 |
ssdeep | 768:A/0skGip8rQbJ9kX1owiZwTQyeg5KZvHO0QcoN52A:xs30bzrwUyeg5KZvroz2A |
imphash | 723e05b1ed716ac47dc010aba61abbb0 |
File size | 44.0 KB ( 45056 bytes ) |
File type | Win32 EXE |
Magic literal | PE32 executable for MS Windows (console) Intel 80386 32-bit |
Antivirus detection
Antivirus | Result | Update |
---|---|---|
AVG | Generic_c.VPG | 20140225 |
Ad-Aware | Application.Sniffer.Ksniff.A | 20140225 |
Agnitum | Sniffer.Ksniff!9m6V8ar2qT8 | 20140225 |
AhnLab-V3 | Win-Trojan/Ksniff.45056 | 20140225 |
AntiVir | TR/Sniffer.Ksniff | 20140225 |
Antiy-AVL | HackTool/Win32.Ksniff | 20140225 |
Avast | Win32:Trojan-gen | 20140225 |
Baidu-International | HackTool.Win32.Sniffer.aqI | 20140225 |
BitDefender | Application.Sniffer.Ksniff.A | 20140225 |
Bkav | W32.Clod677.Trojan.aa8f | 20140225 |
CMC | Generic.Win32.6f8393d4e1!MD | 20140220 |
ClamAV | Trojan.Ksniff | 20140225 |
Commtouch | W32/Sniffer.QCQO-8999 | 20140225 |
Comodo | ApplicUnsaf.Win32.HackTool.Sniffer.Ksniff | 20140225 |
DrWeb | Win32.HLLW.Billy | 20140225 |
F-Prot | W32/Sniffer.H | 20140225 |
F-Secure | Application.Sniffer.Ksniff | 20140225 |
Fortinet | W32/Ksniff!tr | 20140225 |
GData | Application.Sniffer.Ksniff.A | 20140225 |
Jiangmin | Sniffer.Ksniff | 20140225 |
K7AntiVirus | Riskware ( a9dcac7a0 ) | 20140225 |
K7GW | Riskware ( 0040eff71 ) | 20140225 |
Kaspersky | HackTool.Win32.Sniffer.Ksniff | 20140225 |
Kingsoft | Win32.Hack.Ksniffer.(kcloud) | 20140225 |
McAfee | Artemis!6F8393D4E1D0 | 20140225 |
McAfee-GW-Edition | Artemis!6F8393D4E1D0 | 20140225 |
MicroWorld-eScan | Application.Sniffer.Ksniff.A | 20140225 |
Microsoft | Trojan:Win32/Ksniff.A | 20140225 |
NANO-Antivirus | Riskware.Win32.Sniffer.hrkb | 20140225 |
Norman | Suspicious_Gen2.NZYPT | 20140224 |
Panda | Trj/Spy.C | 20140225 |
Rising | PE:Trojan.Win32.Generic.122E2704!305014532 | 20140225 |
Sophos | Mal/Generic-S | 20140225 |
Symantec | Trojan Horse | 20140225 |
TheHacker | Trojan/Hacktool.Sniffer.ksniff | 20140224 |
TrendMicro | HKTL_KSNIFF.A | 20140225 |
TrendMicro-HouseCall | HKTL_KSNIFF.A | 20140225 |
VIPRE | Sniffer.Win32.Ksniff (not malicious) | 20140225 |
ViRobot | Trojan.Win32.Sniffer.45056 | 20140225 |
nProtect | Trojan/W32.HackTool.45056.BF | 20140225 |
ByteHero | 20140225 | |
CAT-QuickHeal | 20140225 | |
ESET-NOD32 | 20140225 | |
Emsisoft | 20140225 | |
Ikarus | 20140225 | |
Malwarebytes | 20140225 | |
Qihoo-360 | 20140225 | |
SUPERAntiSpyware | 20140225 | |
TotalDefense | 20140225 | |
VBA32 | 20140225 |
Usage
Syntax
Usage: rksniffer.exe [options]
Options
-l list all active adapters on the machine -i [adapter] select adapter -s [port] source port for filtering received packets -d [port] destination port for filtering received packets -o [file] print results in file or in stdout if not specified -c [count] snif [count] packets -a display packet content in ASCII format -x display packet content in hex format -X display packet content in hex and ASCII format -t display time information -h display this help
Example
List available adapters
C:\tools>rksniffer.exe -l Adapter 0 -> 192.168.102.129
Sniff
C:\tools>rksniffer.exe -i "Adapter 0" -X -t -o output.txt 29 packet(s) received. CTRL-C, Exiting...
View output file
C:\tools>more output.txt 08:59:15 UDP 192.168.102.129:1027 > 192.168.102.128:53 id 145 ttl 128 tos 0 len 56 udplen 36 DATAS [HEX & ASCII] 00000000 45 00 00 38 00 91 00 00 80 11 eb d1 c0 a8 66 81 E..8..........f. 00000010 c0 a8 66 80 04 03 00 35 00 24 7a f3 1e 6f 01 00 ..f....5.$z..o.. 00000020 00 01 00 00 00 00 00 00 06 67 6f 6f 67 6c 65 03 .........google. 00000030 63 6f 6d 00 00 01 00 01 com..... ▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒ 08:59:15 ICMP 192.168.102.128 > 192.168.102.129 destination unreachable(Port unreachable) id 22155 ttl 64 tos 192 len 84 DATAS [HEX & ASCII] 00000000 45 c0 00 54 56 8b 00 00 40 01 d5 0b c0 a8 66 80 [email protected]. 00000010 c0 a8 66 81 03 03 4b 85 00 00 00 00 45 00 00 38 ..f...K.....E..8 00000020 00 91 00 00 80 11 eb d1 c0 a8 66 81 c0 a8 66 80 ..........f...f. 00000030 04 03 00 35 00 24 7a f3 1e 6f 01 00 00 01 00 00 ...5.$z..o...... 00000040 00 00 00 00 06 67 6f 6f 67 6c 65 03 63 6f 6d 00 .....google.com. 00000050 00 01 00 01 ....
Dynamic analysis
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Static analysis
Sections
Name VirtAddr VirtSize RawSize Entropy -------------------------------------------------------------------------------- .text 0x1000 0x6f54 0x7000 6.636845 .rdata 0x8000 0xa2e 0x1000 3.940224 .data 0x9000 0x2c44 0x2000 3.557306
IAT
KERNEL32.dll
|
WS2_32.dll
|
Strings
QPPh PWhP PPPj XSVWj ^3 YY_^] YY_^[] QQSVW QPShL CY;] YY_^[ QQSVW YY_^[ SVWj SVWj SVWj _^[] SVWj tYhX -t09] tG9U X_^[ ^QQSUVW3 hh#@ j4UV HHtSHt t"Ht Y_^][YY 9^(u& 9^(u 9^ t 9^$u u VW YY9^ u VW YY9^$u VW YY9^ 9^ t 9^$u YY9^ 9^ t 9^$u+ t VW YY9^ u t VW YY9^$u t VW YY9^ 9^ t 9^$u Y_^3 Yu!j ^_[3 GIt# t&:a <8=u _9=( YYh( SUVW _^][ hn6@ NNtS t-NuT ~&WP SVW3 F;5@ X_[^ HHtpHHtl Yt f RPWV DSUVWh _^][ u+Vj ^95@ F;5@ j?I_ u 9} ulSj uY;] pD#U j #M j?^; X_^[ _WPS QSUV WWWWj t/WWUPj _^][Y SUVW _^][ QQSV btHHt. SUV3 _^][ t9UW ?=t"U QQS3 PSSW 8"uD 8"uF@ 8"u, @@f9 @@f9 SS@SSPVSS t#SSUP t$$VSS _^][YY SVWUj ]_^[ h$]@ t.;t$$t( VC20XC00U SVWU tEVU t3x< ]_^[ VWss 0SVW _u@W PWPSS PWPSS 9] u t 9] tySS t-VW 90tr 0B=H Wj@Y3 t7SW @AA; QQSVW3 tUj= t@9u uT9} 8<=t ^][_ t-Ht!Ht 5t.; PVh| VWuBh tzVS GIt% t/Ku uFWWj "WWSh| 9} u E WW tMWWS t@9} VSh wDVSU _^][ @}>j W;5 (8PX 700WP `h```` ppxxxx (null) runtime error TLOSS error SING error DOMAIN error R6028 - unable to initialize heap R6027 - not enough space for lowio initialization R6026 - not enough space for stdio initialization R6025 - pure virtual function call R6024 - not enough space for _onexit/atexit table R6019 - unable to open console device R6018 - unexpected heap error R6017 - unexpected multithread lock error R6016 - not enough space for thread data abnormal program termination R6009 - not enough space for environment R6008 - not enough space for arguments R6002 - floating point not loaded Microsoft Visual C++ Runtime Library Runtime Error! Program: <program name unknown> GetLastActivePopup GetActiveWindow MessageBoxA user32.dll GetComputerNameA SetConsoleTextAttribute GetConsoleScreenBufferInfo GetStdHandle GetLocalTime FormatMessageA GetLastError SetConsoleTitleA KERNEL32.dll WSAIoctl WSASocketA WS2_32.dll HeapFree HeapAlloc ExitProcess TerminateProcess GetCurrentProcess SetConsoleCtrlHandler GetCommandLineA GetVersion SetHandleCount GetFileType GetStartupInfoA HeapDestroy HeapCreate VirtualFree VirtualAlloc HeapReAlloc WideCharToMultiByte CloseHandle UnhandledExceptionFilter FlushFileBuffers WriteFile GetModuleFileNameA FreeEnvironmentStringsA FreeEnvironmentStringsW GetEnvironmentStrings GetEnvironmentStringsW RtlUnwind SetFilePointer MultiByteToWideChar GetCPInfo CompareStringA CompareStringW GetACP GetOEMCP SetEnvironmentVariableA SetStdHandle CreateFileA GetStringTypeA GetStringTypeW GetProcAddress LoadLibraryA LCMapStringA LCMapStringW SetEndOfFile ReadFile WSAIoctl(), %s socket(), %s Adapter %d -> %s Error: This box doesn't have any adapter. Exiting... Required option missing IP header bad TTL equals 0 during reassembly TTL equals 0 during transit Redirect for TOS and host Redirect for TOS and network Redirect for host Redirect for network Precedence cutoff in effect Host precedence violation Communication administratively filtered Host unreachable for TOS Network unreachable for TOS Host administratively prohibited Network administratively prohibited Source host isolated Destination host unknown Destination network unknown Source route failed Fragmentation needed Port unreachable Protocol unreachable Host unreachable Network unreachable recvfrom failed: %d bind(), %s GetAdapter(), %s gethostbyname(), %s GetComputerName(), %s unknown icmp (obsolete or malformed?) address mask reply address mask request information reply information request timestamp reply timestamp request (unknown - error?) (%s) parameter problem (%s) ttl exceeded router solicitation mobile ip advertisement router advertisement echo request redirect source quench (flow control) destination unreachable echo reply %02x [HEX] %08x %08x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x %02x [HEX & ASCII] No Datas. [ASCII] %02d:%02d:%02d id %d ttl %d tos %d len %d %s %s > ICMP len %d tos %d ttl %d win %d id %d %s:%d %s:%d > id %d ttl %d tos %d len %d udplen %d %s: invalid option -- %c %s: illegal option -- %c %s: option requires an argument -- %c %s: unrecognized option `%c%s' %s: unrecognized option `--%s' %s: option `%s' requires an argument %s: option `%c%s' doesn't allow an argument %s: option `--%s' doesn't allow an argument %s: option `%s' is ambiguous POSIXLY_CORRECT icmp Usage: rksniffer.exe [options] [options] -l list all active adapters on the machine -i [adapter] select adapter -s [port] source port for filtering received packets -d [port] destination port for filtering received packets -o [file] print results in file or in stdout if not specified -c [count] snif [count] packets -a display packet content in ASCII format -x display packet content in hex format -X display packet content in hex and ASCII format -t display time information -h display this help CTRL-C, Exiting... %d packet(s) received. WSASocket() failed: %s fopen() failed: %s %d Error(s), Exiting... Error: "%s" Incorrect protocol. Error: Incorrect count. Specify a count superior at 0. Error: Incorrect port. Specify a port between 0 and 65535. li:s:d:p:o:c:axXth WSAStartup() failed: %s SetConsoleTitle() failed: %s RKSniffer DATAS ! Another protocol was sniffed !