HEUR:Trojan.Win32.Generic (Kaspersky), Trojan.Crypt.EL (B) (Emsisoft), Trojan.Crypt.EL (AdAware), GenericAutorunWorm.YR (Lavasoft MAS)Behaviour: Trojan, Worm, WormAutorun
The description has been automatically generated by Lavasoft Malware Analysis System and it may contain incomplete or inaccurate information.
Summary
MD5: 0ed04d3bf545d16e27373f1dc8e25b96
SHA1: 002650d60953f287722421d7c88515f9b1e5b73e
SHA256: 77f47f9710895724ce6dfb153722efdb07c19c704e5754137271760b3afd1dc8
SSDeep: 384:IqTfFGmEb6ec9Jqm b42wCKt2Xe6w3z8XBcWaFzra8ypNWodXU:TUj8JNndAXGWa28ypN5l
Size: 17412 bytes
File type: EXE
Platform: WIN32
Entropy: Packed
PEID: UPolyXv05_v6
Company: no certificate found
Created at: 2008-06-10 11:48:24
Analyzed on: WindowsXPESX SP3 32-bit
Summary: Trojan. A program that appears to do one thing but actually does another (a.k.a. Trojan Horse).
Dynamic Analysis
Payload
Behaviour | Description |
---|---|
WormAutorun | A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer. |
Process activity
The Trojan creates the following process(es):
ipconfig.exe:1768
%original file name%.exe:580
The Trojan injects its code into the following process(es):
csrss.exe:352
Mutexes
The following mutexes were created/opened:No objects were found.
File activity
The process %original file name%.exe:580 makes changes in the file system.
The Trojan creates and/or writes to the following file(s):
C:\mfxixue.bat (100 bytes)
%WinDir%\Tasks\csrss.exe (1444 bytes)
Registry activity
The process ipconfig.exe:1768 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "2A 5D 0B E6 57 05 7B 66 E9 E9 D1 1B EF 4A 01 82"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"Guid" = "8aefce96-4618-42ff-a057-3536aa78233e"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"Active" = "1"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryMessageFile" = "%System%\ESENT.dll"
"EventMessageFile" = "%System%\ESENT.dll"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"Active" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"Active" = "1"
"ControlFlags" = "1"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy\traceIdentifier]
"BitNames" = " Error Unusual Info Debug"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\QUtil]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg\traceIdentifier]
"Guid" = "5f31090b-d990-4e91-b16d-46121d0255aa"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"ControlFlags" = "1"
[HKLM\System\CurrentControlSet\Services\Eventlog\Application\ESENT]
"CategoryCount" = "16"
"TypesSupported" = "7"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappcfg]
"LogSessionName" = "stdout"
[HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Tracing\Microsoft\eappprxy]
"ControlFlags" = "1"
The process %original file name%.exe:580 makes changes in the system registry.
The Trojan creates and/or sets the following values in system registry:
[HKLM\SOFTWARE\Microsoft\Cryptography\RNG]
"Seed" = "75 92 E9 9F 25 8F C8 B2 09 A0 FD 3C C3 5B 53 DE"
Dropped PE files
MD5 | File path |
---|---|
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\bin\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\IEExamples\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\PerlEx\benchmarks\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\PerlEx\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\Windows Script Components\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\Windows Script Host\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\aspSamples\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\cgi\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\fork\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\eg\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\etc\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\Components\Windows\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\Components\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\bin\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\faq\Windows\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\faq\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\images\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActivePerl\DocTools\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActivePerl\PPM\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActivePerl\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActiveState\Config\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActiveState\PerlCritic\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActiveState\Tkx\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActiveState\Win32\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\ActiveState\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Algorithm\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\App\Prove\State\Result\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\App\Prove\State\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\App\Prove\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\App\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Archive\Tar\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Archive\Zip\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Archive\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Attribute\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\B\Lint\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\B\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Bit\Vector\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Bit\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Bundle\DBD\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Bundle\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CGI\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Backend\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Config\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Dist\Build\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Dist\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Internals\Source\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Internals\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Module\Author\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Module\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Shell\Default\Plugins\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Shell\Default\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\Shell\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPANPLUS\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPAN\API\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPAN\Meta\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\CPAN\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Carp\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\Accessor\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\C3\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\Data\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\Load\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\MOP\Class\Immutable\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\MOP\Class\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\MOP\Method\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\MOP\Mixin\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\MOP\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Class\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Compress\Raw\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Compress\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Config\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\File\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\Gofer\Policy\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\Gofer\Transport\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\Gofer\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\ODBC\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\Oracle\Troubleshooting\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\Oracle\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\SQLite\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBD\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\Const\GetInfo\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\Const\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\DBD\SqlEngine\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\DBD\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\Gofer\Serializer\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\Gofer\Transport\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\Gofer\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\ProfileDumper\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\SQL\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\Util\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBI\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\DBM_Filter\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Data\Dump\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Data\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Date\Calc\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Date\Calendar\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Date\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Devel\NYTProf\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Devel\StackTrace\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\Devel\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\autodie\exception\wsock32.dll |
d50cc09e37307d26ad4c2fce8957d0ed | c:\Perl\html\lib\autodie\wsock32.dll |
74d1714198df65437f50e3bedbe569e8 | c:\WINDOWS\Tasks\csrss.exe |
d50cc09e37307d26ad4c2fce8957d0ed | c:\WINDOWS\Tasks\wsock32.dll |
74d1714198df65437f50e3bedbe569e8 | c:\WINDOWS\Tasks\ÂÌ»¯.bat |
HOSTS file anomalies
The Trojan modifies "%System%\drivers\etc\hosts" file which is used to translate DNS entries to IP addresses. The modified file is 884 bytes in size. The following strings are added to the hosts file listed below:
127.0.0.1 | www.360.cn |
127.0.0.1 | www.360safe.cn |
127.0.0.1 | www.360safe.com |
127.0.0.1 | home.ahnlab.com |
127.0.0.1 | www.rising.com.cn |
127.0.0.1 | rising.com.cn |
127.0.0.1 | dl.jiangmin.com |
127.0.0.1 | jiangmin.com |
127.0.0.1 | www.jiangmin.com |
127.0.0.1 | www.duba.net |
127.0.0.1 | www.eset.com.cn |
127.0.0.1 | www.nod32.com |
127.0.0.1 | shadu.duba.net |
127.0.0.1 | www.kaspersky.co.kr |
127.0.0.1 | www.viruschaser.com |
127.0.0.1 | kaspersky.com.cn |
127.0.0.1 | virustotal.com |
127.0.0.1 | www.kaspersky.com |
127.0.0.1 | 60.210.176.251 |
127.0.0.1 | www.cnnod32.cn |
127.0.0.1 | www.lanniao.org |
127.0.0.1 | www.nod32club.com |
127.0.0.1 | www.dswlab.com |
127.0.0.1 | bbs.sucop.com |
127.0.0.1 | www.virustotal.com |
127.0.0.1 | tool.ikaka.com |
127.0.0.0 | 360.qihoo.com |
127.0.0.1 | qihoo.com |
127.0.0.1 | www.qihoo.com |
127.0.0.1 | www.qihoo.cn |
Rootkit activity
No anomalies have been detected.
Propagation
A worm can spread via removable drives. It writes its executable and creates "autorun.inf" scripts on all removable drives. The autorun script will execute the Trojan's file once a user opens a drive's folder in Windows Explorer.
Removals
Remove it with Ad-Aware
- Click (here) to download and install Ad-Aware Free Antivirus.
- Update the definition files.
- Run a full scan of your computer.
Manual removal*
- Terminate malicious process(es) (How to End a Process With the Task Manager):
ipconfig.exe:1768
%original file name%.exe:580 - Delete the original Trojan file.
- Delete or disinfect the following files created/modified by the Trojan:
C:\mfxixue.bat (100 bytes)
%WinDir%\Tasks\csrss.exe (1444 bytes) - Restore the original content of the HOSTS file (%System%\drivers\etc\hosts): 127.0.0.1 localhost
- Clean the Temporary Internet Files folder, which may contain infected files (How to clean Temporary Internet Files folder).
- Find and delete all copies of the worm's file together with "autorun.inf" scripts on removable drives.
- Reboot the computer.
Static Analysis
VersionInfo
No information is available.
No information is available.
PE Sections
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Section MD5 |
---|---|---|---|---|---|
.data | 4096 | 30860 | 1536 | 5.25168 | 31392cffd7cb634aa8c140cd4335067a |
.rsrc | 36864 | 8192 | 0 | 0 | d41d8cd98f00b204e9800998ecf8427e |
.shoooo | 45056 | 16384 | 14848 | 5.51577 | 105e1ee7b1c910e9f70c16f4b088ca41 |
Dropped from:
Downloaded by:
Similar by SSDeep:
Similar by Lavasoft Polymorphic Checker:
Network Activity
URLs
URL | IP |
---|---|
hxxp://192.168.1.1/ |
IDS verdicts (Suricata alerts: Emerging Threats ET ruleset)
Traffic
OPTIONS / HTTP/1.1..translate: f..User-Agent: Microsoft-WebDAV-MiniRedir/5.1.2600..Host: 192.168.1.1..Content-Length: 0..Connection: Keep-Alive....
HTTP/1.1 200 OK
Expires: Sun, 19 Oct 2014 23:16:21 GMT
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: max-age=180000
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Last-Modified: Fri, 17 Oct 2014 21:16:21 GMT
X-Frame-Options: SAMEORIGIN
Set-Cookie: PHPSESSID=7783c394f6868356bc89ed344377fd1d; path=/
Set-Cookie: cookie_test=1413584181
Pragma: no-cache
Content-type: text/html
Transfer-Encoding: chunked
Date: Fri, 17 Oct 2014 21:16:21 GMT
Server: lighttpd/1.4.35
1a22...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN". "hXXp://VVV.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<html xmlns="hXXp://VVV.w3.org/1999/xhtml" lang="en" xml:lang="en">..<head>...<script type="text/javascript" src="/javascript/jquery.js"></script>...<script type="text/javascript">...//<![CDATA[...$(document).ready(function() { jQuery('#usernamefld').focus(); });...//]]>...</script>....<title>Login</title>...<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />...<link rel="shortcut icon" href="/themes/pfsense_ng/images/icons/favicon.ico" />.....<link rel="stylesheet" type="text/css" href="/themes/pfsense_ng/login.css" media="all" />.....<script type="text/javascript">...//<![CDATA[....function page_load() {}....function clearError() {.....if($('#inputerrors')).....$('#inputerrors').html('');....}..... var input_errors = '';. jQuery(document).ready(init);. . var noAjaxOnSubmit = false;.. function init() {. if(jQuery('#submit') && ! noAjaxOnSubmit) {. // debugging helper. //alert('adding observe event for submit button');. . jQuery("#submit").click(submit_form);. jQuery('#submit').click(function() {return false;});. var to_insert = "<div style='visibility:hidden' id='loading' name='loading'><img src='/themes/pfsense_ng/images/misc/loader.gif' alt='loader' \/><\/div>";. jQuery('#submit').before
<<< skipped >>>
Map
The Trojan connects to the servers at the folowing location(s):
Strings from Dumps
csrss.exe_352:
.data
.data
.rsrc
.rsrc
.shoooo
.shoooo
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://vntkr.com/img/btn/wm/arp.exe
hXXp://vntkr.com/img/btn/wm/arp.exe
hXXp://vntkr.com/img/btn/wm/wincap.exe
hXXp://vntkr.com/img/btn/wm/wincap.exe
hXXp://vntkr.com/img/btn/tj/ct.asp
hXXp://vntkr.com/img/btn/tj/ct.asp
hXXp://vntkr.com/img/btn/wm/updatexixue.txt
hXXp://vntkr.com/img/btn/wm/updatexixue.txt
hXXp://vntkr.com/img/btn/wm/mm.exe
hXXp://vntkr.com/img/btn/wm/mm.exe
c:\_default.pif
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
FWMon.exe
del "%s"
del "%s"
start %s
start %s
c:\mfxixue.bat
c:\mfxixue.bat
%WinDir%\Tasks
%WinDir%\Tasks
AST.exe
AST.exe
360tray.exe
360tray.exe
ast.exe
ast.exe
windows
windows
hXXp://VVV.microsoft.com
hXXp://VVV.microsoft.com
autorun.inf
autorun.inf
\GHOSTBAK.exe
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\wincap.exe
\arps.com
\arps.com
%d.%d.%d.%d
%d.%d.%d.%d
1314520
1314520
5201314
5201314
12345678
12345678
password
password
at \\%s %d:%d %s
at \\%s %d:%d %s
F:\hackshen.exe
F:\hackshen.exe
\\%s\F$\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
\\%s\ipc$
mpr.dll
mpr.dll
hXXp://vntkr.com/img/btn/10.exe
hXXp://vntkr.com/img/btn/10.exe
hXXp://vntkr.com/img/btn/9.exe
hXXp://vntkr.com/img/btn/9.exe
hXXp://vntkr.com/img/btn/8.exe
hXXp://vntkr.com/img/btn/8.exe
hXXp://vntkr.com/img/btn/7.exe
hXXp://vntkr.com/img/btn/7.exe
hXXp://vntkr.com/img/btn/6.exe
hXXp://vntkr.com/img/btn/6.exe
hXXp://vntkr.com/img/btn/5.exe
hXXp://vntkr.com/img/btn/5.exe
hXXp://vntkr.com/img/btn/4.exe
hXXp://vntkr.com/img/btn/4.exe
hXXp://vntkr.com/img/btn/2.exe
hXXp://vntkr.com/img/btn/2.exe
hXXp://vntkr.com/img/btn/1.exe
hXXp://vntkr.com/img/btn/1.exe
hXXp://vntkr.com/img/btn/3.exe
hXXp://vntkr.com/img/btn/3.exe
%s?mac=%s&ver=2.2
%s?mac=%s&ver=2.2
windows config
windows config
\mfxixue.ini
\mfxixue.ini
%s -ep a "%s" %s
%s -ep a "%s" %s
\WinRAR\Rar.exe
\WinRAR\Rar.exe
\meupdate.ini
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 VVV.qihoo.cn
127.0.0.1 9u9u9.cn
127.0.0.1 9u9u9.cn
127.0.0.1 58.17.236.92
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 shadu.duba.net
127.0.0.1 VVV.kaspersky.co.kr
127.0.0.1 VVV.kaspersky.co.kr
127.0.0.1 VVV.viruschaser.com
127.0.0.1 VVV.viruschaser.com
127.0.0.1 kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 VVV.360safe.com
127.0.0.1 home.ahnlab.com
127.0.0.1 home.ahnlab.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
\svchost.exe
ntdll.dll
ntdll.dll
Set rs=createObject("Wscript.shell")
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%Documents and Settings%
%WinDir%
%WinDir%
%s\%s
%s\%s
%s\*.*
%s\*.*
\Tasks\wsock32.dll
\Tasks\wsock32.dll
\wsock32.dll
\wsock32.dll
%System%\arps.com
%System%\arps.com
%System%\wincap.exe
%System%\wincap.exe
%System%
%System%
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\0NrSJbRlzJ.pif
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\0NrSJbRlzJ.pif
%WinDir%\Tasks\
%WinDir%\Tasks\
%WinDir%\Tasks\csrss.exe
%WinDir%\Tasks\csrss.exe
.reloc
.reloc
kernel32.dll
kernel32.dll
}y%Dw
}y%Dw
csrss.exe_352_rwx_00401000_0000B000:
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}\GHOSTBAK.exe
hXXp://vntkr.com/img/btn/wm/arp.exe
hXXp://vntkr.com/img/btn/wm/arp.exe
hXXp://vntkr.com/img/btn/wm/wincap.exe
hXXp://vntkr.com/img/btn/wm/wincap.exe
hXXp://vntkr.com/img/btn/tj/ct.asp
hXXp://vntkr.com/img/btn/tj/ct.asp
hXXp://vntkr.com/img/btn/wm/updatexixue.txt
hXXp://vntkr.com/img/btn/wm/updatexixue.txt
hXXp://vntkr.com/img/btn/wm/mm.exe
hXXp://vntkr.com/img/btn/wm/mm.exe
c:\_default.pif
c:\_default.pif
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
SOFTWARE\Microsoft\Active Setup\Installed Components\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
FWMon.exe
FWMon.exe
del "%s"
del "%s"
start %s
start %s
c:\mfxixue.bat
c:\mfxixue.bat
%WinDir%\Tasks
%WinDir%\Tasks
AST.exe
AST.exe
360tray.exe
360tray.exe
ast.exe
ast.exe
windows
windows
hXXp://VVV.microsoft.com
hXXp://VVV.microsoft.com
autorun.inf
autorun.inf
\GHOSTBAK.exe
\GHOSTBAK.exe
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
recycle.{645FF040-5081-101B-9F08-00AA002F954E}
%s -idx 0 -ip %s -port 80 -insert "%s"
%s -idx 0 -ip %s -port 80 -insert "%s"
%s\arps.com
%s\arps.com
%d.%d.%d.2-%d.%d.%d.255
%d.%d.%d.2-%d.%d.%d.255
\wincap.exe
\wincap.exe
\arps.com
\arps.com
%d.%d.%d.%d
%d.%d.%d.%d
1314520
1314520
5201314
5201314
12345678
12345678
password
password
at \\%s %d:%d %s
at \\%s %d:%d %s
F:\hackshen.exe
F:\hackshen.exe
\\%s\F$\hackshen.exe
\\%s\F$\hackshen.exe
E:\hackshen.exe
E:\hackshen.exe
\\%s\E$\hackshen.exe
\\%s\E$\hackshen.exe
D:\hackshen.exe
D:\hackshen.exe
\\%s\D$\hackshen.exe
\\%s\D$\hackshen.exe
C:\hackshen.exe
C:\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\C$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\admin$\hackshen.exe
\\%s\ipc$
\\%s\ipc$
mpr.dll
mpr.dll
hXXp://vntkr.com/img/btn/10.exe
hXXp://vntkr.com/img/btn/10.exe
hXXp://vntkr.com/img/btn/9.exe
hXXp://vntkr.com/img/btn/9.exe
hXXp://vntkr.com/img/btn/8.exe
hXXp://vntkr.com/img/btn/8.exe
hXXp://vntkr.com/img/btn/7.exe
hXXp://vntkr.com/img/btn/7.exe
hXXp://vntkr.com/img/btn/6.exe
hXXp://vntkr.com/img/btn/6.exe
hXXp://vntkr.com/img/btn/5.exe
hXXp://vntkr.com/img/btn/5.exe
hXXp://vntkr.com/img/btn/4.exe
hXXp://vntkr.com/img/btn/4.exe
hXXp://vntkr.com/img/btn/2.exe
hXXp://vntkr.com/img/btn/2.exe
hXXp://vntkr.com/img/btn/1.exe
hXXp://vntkr.com/img/btn/1.exe
hXXp://vntkr.com/img/btn/3.exe
hXXp://vntkr.com/img/btn/3.exe
%s?mac=%s&ver=2.2
%s?mac=%s&ver=2.2
windows config
windows config
\mfxixue.ini
\mfxixue.ini
%s -ep a "%s" %s
%s -ep a "%s" %s
\WinRAR\Rar.exe
\WinRAR\Rar.exe
\meupdate.ini
\meupdate.ini
127.0.0.0 360.qihoo.com
127.0.0.0 360.qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.com
127.0.0.1 VVV.qihoo.cn
127.0.0.1 VVV.qihoo.cn
127.0.0.1 9u9u9.cn
127.0.0.1 9u9u9.cn
127.0.0.1 58.17.236.92
127.0.0.1 58.17.236.92
127.0.0.1 VVV.kaspersky.com
127.0.0.1 VVV.kaspersky.com
127.0.0.1 60.210.176.251
127.0.0.1 60.210.176.251
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.cnnod32.cn
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.lanniao.org
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.nod32club.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 VVV.dswlab.com
127.0.0.1 bbs.sucop.com
127.0.0.1 bbs.sucop.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 VVV.virustotal.com
127.0.0.1 tool.ikaka.com
127.0.0.1 tool.ikaka.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.jiangmin.com
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.duba.net
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.eset.com.cn
127.0.0.1 VVV.nod32.com
127.0.0.1 VVV.nod32.com
127.0.0.1 shadu.duba.net
127.0.0.1 shadu.duba.net
127.0.0.1 VVV.kaspersky.co.kr
127.0.0.1 VVV.kaspersky.co.kr
127.0.0.1 VVV.viruschaser.com
127.0.0.1 VVV.viruschaser.com
127.0.0.1 kaspersky.com.cn
127.0.0.1 kaspersky.com.cn
127.0.0.1 virustotal.com
127.0.0.1 virustotal.com
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.cn
127.0.0.1 VVV.360safe.com
127.0.0.1 VVV.360safe.com
127.0.0.1 home.ahnlab.com
127.0.0.1 home.ahnlab.com
127.0.0.1 VVV.rising.com.cn
127.0.0.1 VVV.rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 rising.com.cn
127.0.0.1 dl.jiangmin.com
127.0.0.1 dl.jiangmin.com
127.0.0.1 jiangmin.com
127.0.0.1 jiangmin.com
\svchost.exe
\svchost.exe
ntdll.dll
ntdll.dll
Set rs=createObject("Wscript.shell")
Set rs=createObject("Wscript.shell")
rs.run "%%windir%%\Tasks\csrss.exe",0
rs.run "%%windir%%\Tasks\csrss.exe",0
\Tasks\hackshen.vbs
\Tasks\hackshen.vbs
SOFTWARE\Microsoft\Windows Script Host\Settings
SOFTWARE\Microsoft\Windows Script Host\Settings
%windir%\Tasks\hackshen.vbs
%windir%\Tasks\hackshen.vbs
%Documents and Settings%
%Documents and Settings%
%WinDir%
%WinDir%
%s\%s
%s\%s
%s\*.*
%s\*.*
\Tasks\wsock32.dll
\Tasks\wsock32.dll
\wsock32.dll
\wsock32.dll
%System%\arps.com
%System%\arps.com
%System%\wincap.exe
%System%\wincap.exe
%System%
%System%
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\0NrSJbRlzJ.pif
C:\DOCUME~1\"%CurrentUserName%"\LOCALS~1\Temp\0NrSJbRlzJ.pif
%WinDir%\Tasks\
%WinDir%\Tasks\
%WinDir%\Tasks\csrss.exe
%WinDir%\Tasks\csrss.exe
.data
.data
.reloc
.reloc
.shoooo
.shoooo
kernel32.dll
kernel32.dll
}y%Dw
}y%Dw