Trojan-Dropper.Win32.Sysn.cdcv (Kaspersky), Dropped:Generic.Malware.Sdld.C425D330 (B) (Emsisoft), Dropped:Generic.Malware.Sdld.C425D330 (AdAware), IRC-Worm.Win32.MyDoom.FD, GenericIRCBot.YR (Lavasoft MAS)Behaviour: Trojan-Dropper, Trojan, Worm, IRC-Worm, IRCBot, Malware
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 0e0d16fad0165ca0378566e8707fcebe
SHA1: f6784d4ccbb3c9483ca0e0d6c5c3fc988136c879
SHA256: 81f69dc1bdb6a242d2998c600b7cb2b35653327cdc9faafad97956972ea0cf7b
SSDeep: 24576:/gFkg R9SDI5xJyTzgLqZQg2v58fdCUO/A5d7okvyhZHfsQ T:IKgI9SGJGcLmE8f0UO/W7vyhZHfsD
Size: 1166208 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 1992-06-20 01:22:17
Analyzed on: Windows7 SP1 32-bit
Summary: Trojan-Dropper. Trojan program, intended for stealth installation of other malware into user's system.
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
IRCBot | A bot can communicate with command and control servers via IRC channel. |
Process activity
The Dropped creates the following process(es):
%original file name%.exe:1264
The Dropped injects its code into the following process(es):No processes have been created.
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:1264 makes changes in the file system.
The Dropped creates and/or writes to the following file(s):
C:\Windows\win32dc\BattleField 1942 patch.exe (10715 bytes)
C:\Windows\win32dc\FlatOut_trainer.exe (7547 bytes)
C:\Windows\win32dc\BattleField 1942_codes.exe (12062 bytes)
C:\Windows\win32dc\BattleField 1942 hack.exe (13417 bytes)
C:\Windows\win32dc\BattleField 1942(crack).exe (7547 bytes)
C:\Windows\win32dc\UT2004 crack.exe (7547 bytes)
C:\Windows\win32dc\UT2004_cheat.exe (9209 bytes)
C:\Windows\win32dc\Counter-Strike(cdfix).exe (7879 bytes)
C:\Windows\win32dc\UT2004_fix.exe (9209 bytes)
C:\Windows\win32dc\Half-Life 2(cheat).exe (7879 bytes)
Registry activity
Dropped PE files
MD5 | File path |
---|---|
86cbcea4fd73fc77207c128a1af562d6 | c:\Windows\win32dc\BattleField 1942 hack.exe |
61da762fc70454e71f6b5726ae3fdf67 | c:\Windows\win32dc\BattleField 1942 patch.exe |
501d40e0bed20ac24d3ff5dcc658eccd | c:\Windows\win32dc\BattleField 1942_codes.exe |
47ec4f1e3ef3a3988c06d858f2d2c320 | c:\Windows\win32dc\Counter-Strike(cdfix).exe |
f2bdc0b710374b70f2b50e897dae1832 | c:\Windows\win32dc\Half-Life 2(cheat).exe |
7536fc6cdbc101eb520a3102e9d90e1c | c:\Windows\win32dc\UT2004_cheat.exe |
8466dfdd522d2d7cceb71f142e61da5b | c:\Windows\win32dc\UT2004_fix.exe |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
No anomalies have been detected.
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1264
- Delete the original Dropped file.
- Delete or disinfect the following files created/modified by the Dropped:
C:\Windows\win32dc\BattleField 1942 patch.exe (10715 bytes)
C:\Windows\win32dc\FlatOut_trainer.exe (7547 bytes)
C:\Windows\win32dc\BattleField 1942_codes.exe (12062 bytes)
C:\Windows\win32dc\BattleField 1942 hack.exe (13417 bytes)
C:\Windows\win32dc\BattleField 1942(crack).exe (7547 bytes)
C:\Windows\win32dc\UT2004 crack.exe (7547 bytes)
C:\Windows\win32dc\UT2004_cheat.exe (9209 bytes)
C:\Windows\win32dc\Counter-Strike(cdfix).exe (7879 bytes)
C:\Windows\win32dc\UT2004_fix.exe (9209 bytes)
C:\Windows\win32dc\Half-Life 2(cheat).exe (7879 bytes)
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
CODE | 4096 | 40592 | 40960 | 4.37354 | 4599c8e48266467f9472d9c0076da0aa |
DATA | 45056 | 416 | 512 | 2.59038 | 6723f313105be59e8f34015bac1ef0c6 |
BSS | 49152 | 4493 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.idata | 57344 | 2332 | 2560 | 2.95832 | 1f3c6fef94d61a4d2beebca25d327785 |
.tls | 61440 | 8 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.rdata | 65536 | 24 | 512 | 0.129329 | bf98d008e3e41c32258f4ddad0423dfc |
.reloc | 69632 | 2396 | 2560 | 4.48773 | c247e5d4f27055db8d87da84767714bb |
.rsrc | 73728 | 1536 | 1536 | 2.62048 | b115dc78febf3048a6accb9f8efeb1de |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Total found: 876
ef2d2eb0996329df1775d6f51f5b214a
c82648bf52942ee83e639e5019c417e2
c050cd1b809541253ff88ee562eaa9f8
bfa30611ed105bbbaa4fcfda3554507c
bc4f499e10f6550c18eb2735e724e135
b653fa5261b9e7c496d436078e5a54e0
b64d60a1ef01cfe7f7954a2f84d923d3
9dc8f82010d6947f9eb4ca2ef89448c2
9d44bba5914e846bb87f0a768adebcb3
9d90741ff90c9a8c5503909f8f65edca
ad4cd03b5eaeff7c70e29a564f7fba2a
a567fd1311445aefe3897b924bde36cf
a1a2076501ac91abde0ceef2574d8f7e
9b2737ede92e073aa7c93aae769a2dcd
958f0a7ee5d4012536f27b118216e67e
90d2d6104645a20c41cc5565a5469bea
8ae0dbf986d8a093b90cf6e0d9dd064e
8765e4dc9a0f039a5c287ba7b2070b04
80410d3e36eba7f4c898207b506eebe9
7e79c96343b3a37db0259a0a695c593d
7a043ced5f1ebd82c9919e26de946050
76f5b19382d5976bbaa310187a1238d9
765e820804b540f6c9ea15a6ef732d42
73ff99b2642a544f24f271544617677f
6bbdeaae367fd0b7abe1713dbb9d6539
67f36fe2d9778626716570cfc3ac68bc
Network Activity
URLs
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
Map
The Dropped connects to the servers at the folowing location(s):
Strings from Dumps
%original file name%.exe_1264:
.idata
.idata
.rdata
.rdata
P.reloc
P.reloc
P.rsrc
P.rsrc
PRIVMSG
PRIVMSG
JOIN
JOIN
login
login
PRIVMSG
PRIVMSG
:File Executed
:File Executed
(netbios_invalidpass:
(netbios_invalidpass:
File(%cur%\
File(%cur%\
File(%sys%\
File(%sys%\
rndnick
rndnick
NICK
NICK
join
join
%sys%\
%sys%\
%cur%\
%cur%\
%rnddir%\%rand%.exe
%rnddir%\%rand%.exe
system.ini
system.ini
explorer.exe
explorer.exe
.com "win2k" :
.com "win2k" :
DCPlusPlus.xml
DCPlusPlus.xml
dcplusplus.xml
dcplusplus.xml
%sys%
%sys%
%cur%
%cur%
\WINDOWS\Start Menu\Programs\Startup\
\WINDOWS\Start Menu\Programs\Startup\
netapi32.dll
netapi32.dll
%rnddir%\%rand%.com
%rnddir%\%rand%.com
irc.lcirc.net
irc.lcirc.net
kernel32.dll
kernel32.dll
user32.dll
user32.dll
GetKeyboardType
GetKeyboardType
advapi32.dll
advapi32.dll
RegOpenKeyExA
RegOpenKeyExA
RegCloseKey
RegCloseKey
oleaut32.dll
oleaut32.dll
GetWindowsDirectoryA
GetWindowsDirectoryA
mpr.dll
mpr.dll
wsock32.dll
wsock32.dll
shell32.dll
shell32.dll
ShellExecuteA
ShellExecuteA
wininet.dll
wininet.dll
URLMON.DLL
URLMON.DLL
URLDownloadToFileA
URLDownloadToFileA
KWindows
KWindows
&pWebServer
&pWebServer