Trojan-Dropper.Win32.Sysn.cdcv (Kaspersky), Dropped:Generic.Malware.Sdld.C425D330 (B) (Emsisoft), Dropped:Generic.Malware.Sdld.C425D330 (AdAware), IRC-Worm.Win32.MyDoom.FD, GenericIRCBot.YR (Lavasoft MAS)Behaviour: Trojan-Dropper, Trojan, Worm, IRC-Worm, IRCBot, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: d5cc7f5974bbc2273cd814d2ec24e81f
SHA1: a9201375b086d22fe12fdb8c6c3715545f2069d2
SHA256: ae8dd5b9d62ea5dfcead3dca6b1f4e9df427dcddde94c98847d7d31cc2afdc75
SSDeep: 24576:/gFkg R9SDI5xJyTzgLqZQg2v58fdCUO/A5d7okvyhZHfsQ lG:IKgI9SGJGcLmE8f0UO/W7vyhZHfs1G
Size: 1170305 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: Windows7 SP1 32-bit
Summary: Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The Dropped creates the following process(es):
%original file name%.exe:3832
The Dropped injects its code into the following process(es):No processes have been created.
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:3832 makes changes in the file system.
The Dropped creates and/or writes to the following file(s):
C:\Windows\win32dc\UT2004 patch.exe (7547 bytes)
C:\Windows\win32dc\Doom 3_serial.exe (7887 bytes)
C:\Windows\win32dc\Half-Life 2_hack.exe (13559 bytes)
C:\Windows\win32dc\UT2004 crack.exe (12171 bytes)
C:\Windows\win32dc\Sims 2 fix.exe (7547 bytes)
C:\Windows\win32dc\Doom 3_crack.exe (7547 bytes)
C:\Windows\win32dc\Quake3 fix.exe (9250 bytes)
C:\Windows\win32dc\Sims 2 patch.exe (7887 bytes)
C:\Windows\win32dc\Sims 2 hack.exe (9250 bytes)
C:\Windows\win32dc\Half-Life 2 nocd.exe (7887 bytes)
Registry activity
Dropped PE files
MD5 | File path |
---|---|
f8be433d58edb4f44b2969e05664d93f | c:\Windows\win32dc\Doom 3_serial.exe |
be8e5b7fb8795e668ad9bca74b13e5f9 | c:\Windows\win32dc\Half-Life 2 nocd.exe |
ba134487028f33c5ec0091900728a8be | c:\Windows\win32dc\Half-Life 2_hack.exe |
e90e6edc58ffcfa572da056e2b49a088 | c:\Windows\win32dc\Quake3 fix.exe |
c388af0db3a8194ba8cfcc5aeaf206e5 | c:\Windows\win32dc\Sims 2 patch.exe |
cc498dcfee425ba282b36c5b9f7eb9ee | c:\Windows\win32dc\Sims 2 hack.exe |
5d2e204d0f76d9d6de630f7a47f0d52d | c:\Windows\win32dc\UT2004 crack.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:3832
- Delete the original Dropped file.
- Delete or disinfect the following files created/modified by the Dropped:
C:\Windows\win32dc\UT2004 patch.exe (7547 bytes)
C:\Windows\win32dc\Doom 3_serial.exe (7887 bytes)
C:\Windows\win32dc\Half-Life 2_hack.exe (13559 bytes)
C:\Windows\win32dc\UT2004 crack.exe (12171 bytes)
C:\Windows\win32dc\Sims 2 fix.exe (7547 bytes)
C:\Windows\win32dc\Doom 3_crack.exe (7547 bytes)
C:\Windows\win32dc\Quake3 fix.exe (9250 bytes)
C:\Windows\win32dc\Sims 2 patch.exe (7887 bytes)
C:\Windows\win32dc\Sims 2 hack.exe (9250 bytes)
C:\Windows\win32dc\Half-Life 2 nocd.exe (7887 bytes)
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
CODE | 4096 | 40592 | 40960 | 4.37354 | 4599c8e48266467f9472d9c0076da0aa |
DATA | 45056 | 416 | 512 | 2.59038 | 6723f313105be59e8f34015bac1ef0c6 |
BSS | 49152 | 4493 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.idata | 57344 | 2332 | 2560 | 2.95832 | 1f3c6fef94d61a4d2beebca25d327785 |
.tls | 61440 | 8 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.rdata | 65536 | 24 | 512 | 0.129329 | bf98d008e3e41c32258f4ddad0423dfc |
.reloc | 69632 | 2396 | 2560 | 4.48773 | c247e5d4f27055db8d87da84767714bb |
.rsrc | 73728 | 1536 | 1536 | 2.62048 | b115dc78febf3048a6accb9f8efeb1de |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 888
ef2d2eb0996329df1775d6f51f5b214a
0bbc9c6e43cd27451e7b79c7ca810f57
0b52db495845b721acbc9697d1b4d1e5
0aac523e7c4943ff0853629ca681cd3f
052b698aca2e03a5f505418afce4834e
031ef5943d437916b0febf5a53e3f137
0274614538a6f2ad2a36dde663e7d578
f740ff60d0ec233f7e955ede5e77fb83
fe0def9a55452507fdff638358d8a1ff
f4f5bba4d4f4086afbb878c2f541a7e0
f3aa4d1b4394101bf8d3dd967c20f3c3
ecfbd936a27de98dab895d92238b5b78
e6062045d1835907af3dd28ed4e13997
c82648bf52942ee83e639e5019c417e2
c050cd1b809541253ff88ee562eaa9f8
bfa30611ed105bbbaa4fcfda3554507c
bc4f499e10f6550c18eb2735e724e135
b653fa5261b9e7c496d436078e5a54e0
b64d60a1ef01cfe7f7954a2f84d923d3
9dc8f82010d6947f9eb4ca2ef89448c2
9d44bba5914e846bb87f0a768adebcb3
9d90741ff90c9a8c5503909f8f65edca
ad4cd03b5eaeff7c70e29a564f7fba2a
a567fd1311445aefe3897b924bde36cf
a1a2076501ac91abde0ceef2574d8f7e
9b2737ede92e073aa7c93aae769a2dcd
Network Activity
URLs
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Map
The Dropped connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_3832:
.idata
.idata
.rdata
.rdata
P.reloc
P.reloc
P.rsrc
P.rsrc
PRIVMSG
PRIVMSG
JOIN
JOIN
login
login
PRIVMSG
PRIVMSG
:File Executed
:File Executed
(netbios_invalidpass:
(netbios_invalidpass:
File(%cur%\
File(%cur%\
File(%sys%\
File(%sys%\
rndnick
rndnick
NICK
NICK
join
join
%sys%\
%sys%\
%cur%\
%cur%\
%rnddir%\%rand%.exe
%rnddir%\%rand%.exe
system.ini
system.ini
explorer.exe
explorer.exe
.com "win2k" :
.com "win2k" :
DCPlusPlus.xml
DCPlusPlus.xml
dcplusplus.xml
dcplusplus.xml
%sys%
%sys%
%cur%
%cur%
\WINDOWS\Start Menu\Programs\Startup\
\WINDOWS\Start Menu\Programs\Startup\
netapi32.dll
netapi32.dll
%rnddir%\%rand%.com
%rnddir%\%rand%.com
irc.lcirc.net
irc.lcirc.net
kernel32.dll
kernel32.dll
user32.dll
user32.dll
GetKeyboardType
GetKeyboardType
advapi32.dll
advapi32.dll
RegOpenKeyExA
RegOpenKeyExA
RegCloseKey
RegCloseKey
oleaut32.dll
oleaut32.dll
GetWindowsDirectoryA
GetWindowsDirectoryA
mpr.dll
mpr.dll
wsock32.dll
wsock32.dll
shell32.dll
shell32.dll
ShellExecuteA
ShellExecuteA
wininet.dll
wininet.dll
URLMON.DLL
URLMON.DLL
URLDownloadToFileA
URLDownloadToFileA
KWindows
KWindows
&pWebServer
&pWebServer