HEUR:Packed.Win32.Upantix.gen (Kaspersky), GenPack:Generic.Malware.Sdld.83779D7D (B) (Emsisoft), GenPack:Generic.Malware.Sdld.83779D7D (AdAware), IRC-Worm.Win32.MyDoom.FD, GenericIRCBot.YR (Lavasoft MAS)Behaviour: Worm, IRC-Worm, Packed, IRCBot, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: f4419bf6a47ea366f0ec71412b96e3a9
SHA1: ccccbeacf07560451ffd0ca34d632f41ea11b744
SHA256: 9bff99487a1e59683c1254cd15408d49a1b0fe08c983f51805fee8e1448046a1
SSDeep: 3072:rCHHHHCsEScXXXXapppppppppp6PPPPPX44444444/cccccccccB5tzllllzMAAB:GHHHH6XXXXzPPPPP 5tzllllzMnJIU/D
Size: 135052 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: Windows7 SP1 32-bit
Summary: Worm. A program that is primarily replicating on networks or removable drives.
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The GenPack creates the following process(es):No processes have been created.The GenPack injects its code into the following process(es):
%original file name%.exe:268
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:268 makes changes in the file system.
The GenPack creates and/or writes to the following file(s):
C:\Windows\win32dc\BattleField 1942 crack.exe (673 bytes)
C:\Windows\win32dc\Counter-Strike(cheat).exe (10879 bytes)
C:\Windows\win32dc\Quake3_serial.exe (673 bytes)
C:\Windows\win32dc\Silent Hill 4(fix).exe (673 bytes)
C:\Windows\win32dc\Quake3_codes.exe (17935 bytes)
C:\Windows\win32dc\Silent Hill 4_hack.exe (6639 bytes)
C:\Windows\win32dc\Doom 3 patch.exe (14311 bytes)
C:\Windows\win32dc\Sims 2(cheat).exe (14311 bytes)
C:\Windows\win32dc\Half-Life 2 nocd.exe (673 bytes)
C:\Windows\win32dc\FlatOut crack.exe (6639 bytes)
Registry activity
Dropped PE files
MD5 | File path |
---|---|
b89aa17e97bd4cd013602b686945b1b6 | c:\Windows\win32dc\Counter-Strike(cheat).exe |
8cec386b8012c9267f364b64f76acdba | c:\Windows\win32dc\Doom 3 patch.exe |
e698e2801cf4e3aebe516f559ee0c22c | c:\Windows\win32dc\FlatOut crack.exe |
8df851f069de6c8fb68d6164b5ff4d01 | c:\Windows\win32dc\Quake3_codes.exe |
85b026b35cb1c9fea81e3b7e1ca47f0f | c:\Windows\win32dc\Silent Hill 4_hack.exe |
4e0248c05d0d1cf1170f7686847ea401 | c:\Windows\win32dc\Sims 2(cheat).exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):No processes have been created.
- Delete the original GenPack file.
- Delete or disinfect the following files created/modified by the GenPack:
C:\Windows\win32dc\BattleField 1942 crack.exe (673 bytes)
C:\Windows\win32dc\Counter-Strike(cheat).exe (10879 bytes)
C:\Windows\win32dc\Quake3_serial.exe (673 bytes)
C:\Windows\win32dc\Silent Hill 4(fix).exe (673 bytes)
C:\Windows\win32dc\Quake3_codes.exe (17935 bytes)
C:\Windows\win32dc\Silent Hill 4_hack.exe (6639 bytes)
C:\Windows\win32dc\Doom 3 patch.exe (14311 bytes)
C:\Windows\win32dc\Sims 2(cheat).exe (14311 bytes)
C:\Windows\win32dc\Half-Life 2 nocd.exe (673 bytes)
C:\Windows\win32dc\FlatOut crack.exe (6639 bytes) - Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
UPX0 | 4096 | 57344 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
UPX1 | 61440 | 77824 | 76288 | 5.52239 | e380809454a40b920ecd312fb7823a0c |
.rsrc | 139264 | 4096 | 2048 | 2.63797 | b5916a1f63e299e8c8a487a2ccfe581b |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 92
160d678a252aefd448f7bd865300d247
3fa15d68ddc812b05674674d25230669
ac52f0d2d4e80319ca96ee9edad1904b
a27dc1ec88ee99ea69da31a6b3db6d11
e84e9a54eb52f8ea74f73388827ee43f
cebcc604c5708853e6d22085c6daec41
ce0718bffbecccb038720866330bb4c1
8e23290f91f5c9b2cd3774e9079e3cc2
5ccab02f261101bc9a4a839f2a43a04e
5ff92265c5224c46d90f70c2b8e3dc2a
229ce8cf36aa7ee1b800b2b4a9025a5b
17c9476d094315b62e9c40b5c709e9b5
f581ca27f039a9dcfc29d748b14866f1
eb0105edfc43d14854a6735f4591551c
e5b37efa77f703c8fc717e2d61036389
d8a63c42ec102be1704df4975ff8f5e5
c4c4b0b0140859ba73f32ef5699aa0e7
bfdac7dacaff8bbb0ab009761263e221
bc39e61844b6dba77ff3eb5541f796cf
a6a46c26aa35964d51e6cb581ddd3a95
3d25e795ac2719ff2ba8dc619aa65e9a
394fa4a723bcbf31cd31d74627101273
2f38ffe69db29e238ebfd35546dfb4a5
18a84aa0122104139586c342f8851ee6
140f71547653298a117b3e7c1681cf2d
0f48dc6fe44b99532d6489a97d079792
Network Activity
URLs
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Map
The GenPack connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_268:
`.rsrc
`.rsrc
1%u5?3fAG\[Rm
1%u5?3fAG\[Rm
PRIVMSG
PRIVMSG
JOIN
JOIN
login
login
PRIVMSG
PRIVMSG
:Fisier Executat
:Fisier Executat
(Director Windows:
(Director Windows:
(netbios_invalidpass:
(netbios_invalidpass:
File(%cur%\
File(%cur%\
File(%sys%\
File(%sys%\
rndnick
rndnick
NICK
NICK
join
join
%sys%\
%sys%\
%cur%\
%cur%\
%rnddir%\%rand%.exe
%rnddir%\%rand%.exe
system.ini
system.ini
explorer.exe
explorer.exe
.com "win2k" :
.com "win2k" :
DCPlusPlus.xml
DCPlusPlus.xml
dcplusplus.xml
dcplusplus.xml
%sys%
%sys%
%cur%
%cur%
\WINDOWS\Start Menu\Programs\Startup\
\WINDOWS\Start Menu\Programs\Startup\
netapi32.dll
netapi32.dll
%rnddir%\%rand%.com
%rnddir%\%rand%.com
us.undernet.org
us.undernet.org
KWindows
KWindows
&pWebServer
&pWebServer
GetWindowsDirectoryA
GetWindowsDirectoryA
RegOpenKeyExA
RegOpenKeyExA
RegCloseKey
RegCloseKey
ShellExecuteA
ShellExecuteA
URLDownloadToFileA
URLDownloadToFileA
GetKeyboardType
GetKeyboardType
.idata
.idata
.rdata
.rdata
P.reloc
P.reloc
P.rsrc
P.rsrc
\|3
\|3
&pWebServ
&pWebServ
FO^nKey
FO^nKey
qyNF.oqu
qyNF.oqu
.Vmlo
.Vmlo
9%dl{
9%dl{
KERNEL32.DLL
KERNEL32.DLL
advapi32.dll
advapi32.dll
mpr.dll
mpr.dll
oleaut32.dll
oleaut32.dll
shell32.dll
shell32.dll
URLMON.DLL
URLMON.DLL
user32.dll
user32.dll
wininet.dll
wininet.dll
wsock32.dll
wsock32.dll
%original file name%.exe_268_rwx_00401000_00014000:
PRIVMSG
PRIVMSG
JOIN
JOIN
login
login
PRIVMSG
PRIVMSG
:Fisier Executat
:Fisier Executat
(Director Windows:
(Director Windows:
(netbios_invalidpass:
(netbios_invalidpass:
File(%cur%\
File(%cur%\
File(%sys%\
File(%sys%\
rndnick
rndnick
NICK
NICK
join
join
%sys%\
%sys%\
%cur%\
%cur%\
%rnddir%\%rand%.exe
%rnddir%\%rand%.exe
system.ini
system.ini
explorer.exe
explorer.exe
.com "win2k" :
.com "win2k" :
DCPlusPlus.xml
DCPlusPlus.xml
dcplusplus.xml
dcplusplus.xml
%sys%
%sys%
%cur%
%cur%
\WINDOWS\Start Menu\Programs\Startup\
\WINDOWS\Start Menu\Programs\Startup\
netapi32.dll
netapi32.dll
%rnddir%\%rand%.com
%rnddir%\%rand%.com
us.undernet.org
us.undernet.org
KWindows
KWindows
&pWebServer
&pWebServer
GetWindowsDirectoryA
GetWindowsDirectoryA
RegOpenKeyExA
RegOpenKeyExA
RegCloseKey
RegCloseKey
ShellExecuteA
ShellExecuteA
URLDownloadToFileA
URLDownloadToFileA
GetKeyboardType
GetKeyboardType
.idata
.idata
.rdata
.rdata
P.reloc
P.reloc
P.rsrc
P.rsrc
\|3
\|3
&pWebServ
&pWebServ
FO^nKey
FO^nKey