Edb2ade8bca0a6b82b9d160ca40db8e5
Jump to navigation
Jump to search
Malware identification
File Identification
MD5 | edb2ade8bca0a6b82b9d160ca40db8e5 |
---|---|
SHA1 | 8f78a243858d0a9a5278bd06a438023e78ba8168 |
SHA256 | 155844dc303bae687c4a026a6d0c1e490f8284172c01e1420037144769436358 |
ssdeep | 3072:mH8SUYJOa8S60iW05ciuQEe7O4XyVnYmpLzlplfi1eFKuPGtBJ0:mX8a8S60ecidEei4C282e8UGO |
imphash | 22deaa3e5166e3019a02358581c9a9ee |
File size | 190.5 KB ( 195,025 bytes ) |
File type | Win32 EXE |
Magic literal | PE32 executable for MS Windows (GUI) Intel 80386 32-bit |
TrID |
|
Antivirus detection
Antivirus | Result | Update |
---|---|---|
AVG | IRC/BackDoor.SdBot.TQF | 20140211 |
Ad-Aware | IRC-Worm.Generic.5607 | 20140212 |
Agnitum | Worm.SdBot!Iq8CvYNv5fs | 20140211 |
AhnLab-V3 | Win32/IRCBot.worm.variant | 20140211 |
AntiVir | TR/Crypt.XPACK.Gen | 20140212 |
Avast | Win32:PackBot-N [Trj] | 20140212 |
Baidu-International | Backdoor.Win32.PackBot.ARd | 20140212 |
BitDefender | IRC-Worm.Generic.5607 | 20140212 |
Bkav | W32.Clodff8.Trojan.d1da | 20140211 |
ByteHero | Virus.Win32.Heur.l | 20140212 |
CAT-QuickHeal | (Suspicious) - DNAScan | 20140212 |
CMC | Generic.Win32.edb2ade8bc!MD | 20140211 |
Commtouch | W32/Sdbot.JVBC-7466 | 20140212 |
Comodo | Backdoor.IRC.SdBot | 20140212 |
DrWeb | Win32.HLLW.MyBot.based | 20140212 |
ESET-NOD32 | IRC/SdBot | 20140212 |
Emsisoft | IRC-Worm.Generic.5607 (B) | 20140212 |
F-Prot | W32/Sdbot.OEY | 20140211 |
F-Secure | IRC-Worm.Generic.5607 | 20140212 |
Fortinet | W32/SDBot.ALE!tr.bdr | 20140212 |
GData | IRC-Worm.Generic.5607 | 20140212 |
Ikarus | Backdoor.Win32.PackBot | 20140212 |
Jiangmin | Backdoor/SdBot.cnu | 20140212 |
K7AntiVirus | Riskware ( 8b2b4a030 ) | 20140211 |
K7GW | Backdoor ( 0000263e1 ) | 20140211 |
Kaspersky | Backdoor.Win32.PackBot.j | 20140212 |
Kingsoft | Win32.Hack.SdBot.al.(kcloud) | 20140212 |
McAfee | W32/Sdbot.worm.gen.h | 20140212 |
McAfee-GW-Edition | W32/Sdbot.worm.gen.h | 20140212 |
MicroWorld-eScan | IRC-Worm.Generic.5607 | 20140212 |
Microsoft | Backdoor:Win32/IRCbot | 20140212 |
NANO-Antivirus | Trojan.Win32.PackBot.fpld | 20140212 |
Norman | Troj_Generic.EEAXQ | 20140212 |
Panda | Trj/Genetic.gen | 20140211 |
Qihoo-360 | Win32/Worm.IRC.360 | 20140212 |
Rising | PE:Backdoor.PackBot.ag!1074796706 | 20140211 |
Sophos | W32/Tilebot-DC | 20140212 |
Symantec | W32.HLLW.Gaobot | 20140212 |
TheHacker | Backdoor/SdBot.ale | 20140212 |
TotalDefense | Win32/Petribot.LR | 20140212 |
TrendMicro | WORM_SDBOT.DFV | 20140212 |
TrendMicro-HouseCall | WORM_SDBOT.DFV | 20140212 |
VBA32 | OScope.Backdoor.Sdbot.Cgen | 20140211 |
VIPRE | Trojan.Win32.Generic!BT | 20140212 |
ViRobot | Backdoor.Win32.PackBot.195025 | 20140212 |
nProtect | Worm/W32.Agent.195025 | 20140212 |
ClamAV | - | 20140212 |
Malwarebytes | - | 20140212 |
SUPERAntiSpyware | - | 20140212 |
Protections
Packer
Packer identification
- PEiD identifies that the malware is packed with "SVKP 1.3x -> Pavol Cerven"
- The strings function also confirms this assumption
- At last, pescanner also shows a section named svkp:
Sections ================================================================================ Name VirtAddr VirtSize RawSize Entropy -------------------------------------------------------------------------------- 0x1000 0x16000 0xa9de 7.995945 [SUSPICIOUS] 0x17000 0x2000 0x86e 7.908491 [SUSPICIOUS] 0x19000 0x68000 0x3352 7.985942 [SUSPICIOUS] .svkp 0x81000 0x21000 0x20dd1 7.401531 [SUSPICIOUS]
Unpacking
Using the SFX option in OllyDbg, we find the OEP at 0x415E96:
Detection of monitoring tools
The analysis of the malware into OllyDbg confirms that it checks for the presence of various monitoring tools via the lopen function:
- \\.\TRW
- \\.\SICE
- \\.\NTICE
- \\.\FILEVXD
- \\.\FILEMON
- \\.\REGVXD
- \\.\REGMON
By manually modifying the value of EAX to a non-zero value:
... and running the program (F9), the following error window appears:
Detection of VMware registry keys
Analysis #1: with VMware registry keys
- The malware detects the presence of VMware registry keys:
- It creates and removes a file named C\Documents and Settings\%user%\Local Settings\Temp\removeMe3186.bat
@echo off :Repeat del "C:\Documents and Settings\malware\Bureau\rep.exe">nul if exist "C:\Documents and Settings\malware\Bureau\rep.exe" goto Repeat del "%0"
- It creates C:\WINDOWS\system32\SVKP.sys
- It removes the initial rep.exe that has been started from the Desktop
Analysis #2: without VMware registry keys
Without VMware registry keys (HKLM\Software\VMware Inc), the specimen behaves differently:
- No longer removed from the desktop
- Copies itself to C:\WINDOWS\win32ssr.exe
- Launches Win32Sr service:
ImagePath | C:\WINDOWS\win32ssr.exe |
---|---|
DisplayName | Win32Sr |
ObjectName | LocalSystem |
FailureActions | 0A 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 01 00 00 00 B8 0B 00 00 |
Description | Platform SDK Enviroment |
- (Still creates C:\WINDOWS\system32\SVKP.sys)
IsDebuggerPresent
Static analysis
Packed version
Strings
There are some interesting strings:
.svkp [SNIP] Application cannot be run with debugger or monitoring tool(s) loaded! Please unload it and restart the application. [SNIP] KERNEL32.DLL USER32.DLL SHELL32.DLL _lopen ExitProcess MessageBoxA ShellExecuteA [SNIP]
From the strings, we can suspect that the malware:
- is packed with SVKP
- will be likely to detect debugging and monitoring tools
IAT
DLL | Function |
---|---|
KERNEL32.DLL |
|
USER32.DLL |
|
SHELL32.DLL |
|
Unpacked version
IAT
Once unpacked, following imports are revealed:
DLL | Function |
---|---|
OLEAUT32.DLL |
|
USER32.DLL |
|
msvcrt.dll |
|