Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- =============================================
- IF YOU FIND THIS AMALWARE ANALYSIS
- PLEASE HELP TO BLOCK THIS INFECTED URL/IP:
- hxxp://diybbb.com/update.exe
- IP: 106.187.46.93
- BECAUSE SOMEONE POORLY TRIED TO REGENERATE THE
- TROJAN DROPPER, BACKDOOR, DOWNLOADER FLyStudio.
- THIS MALWARE ORIGINATED FROM CHINA
- AND USING JAPAN NETWORK TO TRY TO SPREAD IT.
- VIRUS TOTAL DETECTED ONLY 25/42
- https://www.virustotal.com/file/84a6adc0975102ca72cdebcf28f9d962d13742aad5980483ded1e38e93162392/analysis/1327754643/
- SO IF YOU NEED SAMPLE OF THIS, GRAB IT NOW!
- SEE SCREENSHOT ANALYSIS HERE:
- Japanese: http://unixfreaxjp.blogspot.com/2012/01/ocjp-003-nihonn.html
- English: http://bit.ly/A1tofm
- THANK'S - UNIXFREAXJP -
- =============================================
- Sat Jan 28 20:37:20 JST 201
- --20:37:04-- http://diybbb.com/update.exe
- => `update.exe.1'
- Resolving diybbb.com... 106.187.46.93
- Connecting to diybbb.com|106.187.46.93|:80... connected.
- HTTP request sent, awaiting response... 200 OK
- Length: 870,186 (850K) [application/octet-stream]
- 100%[====================================>] 870,186 1.49M/s
- 20:37:05 (1.49 MB/s) - `update.exe.1' saved [870186/870186]
- SHA256: 84a6adc0975102ca72cdebcf28f9d962d13742aad5980483ded1e38e93162392
- SHA1: 9085cfda0b6e0fc9384afe97f37a1323a0358b9f
- MD5: 8eef0a7b25c397a3c14179563c8a0f49
- File size: 849.8 KB ( 870186 bytes )
- File name: update.exe
- First Detected: 2011-12-05
- Last Detected: 2012-01-28
- =======================================
- 1. BINARY ANALYSIS
- =======================================
- Valid PE file (Both IMAGE_SCN_MEM_WRITE & IMAGE_SCN_MEM_EXECUTE are set)
- Written CRC & Actual CRC are different: Claimed: 0 ; Actual: 899,309
- Suspicious timestamp : 0x59BFFA3 [Mon Dec 25 05:33:23 1972 UTC
- Suspicious Compile Time: 1972-12-25 14:33:23
- Identified packer :Installer VISE Custom
- Suspicious Section Name: IMAGE_SECTION_HEADER Entropy: 7.7067096641
- [IMAGE_SECTION_HEADER]
- Name: .data
- Misc: 0x23000
- Misc_PhysicalAddress: 0x23000
- Misc_VirtualSize: 0x23000
- VirtualAddress: 0x9000
- SizeOfRawData: 0x23000
- PointerToRawData: 0x9000
- PointerToRelocations: 0x0
- PointerToLinenumbers: 0x0
- NumberOfRelocations: 0x0
- NumberOfLinenumbers: 0x0
- Characteristics: 0xE0000040
- ----------------------------------
- Malware loads following DLLs
- ----------------------------------
- [IMAGE_IMPORT_DESCRIPTOR]
- OriginalFirstThunk: 0x6690
- Characteristics: 0x6690
- TimeDateStamp: 0x0 [Thu Jan 01 00:00:00 1970 UTC]
- ForwarderChain: 0x0
- Name: 0x67EA
- FirstThunk: 0x6000
- KERNEL32.dll.GetProcAddress Hint[318] <--- Anti Debugging traces
- KERNEL32.dll.LoadLibraryA Hint[450] <---- Anti Debugging traces
- KERNEL32.dll.CloseHandle Hint[27] <-----Anti Debugging traces
- KERNEL32.dll.WriteFile Hint[735]
- KERNEL32.dll.CreateDirectoryA Hint[45] <----- Why has to create a folder?
- KERNEL32.dll.GetTempPathA Hint[357]
- KERNEL32.dll.ReadFile Hint[536]
- KERNEL32.dll.SetFilePointer Hint[618]
- KERNEL32.dll.CreateFileA Hint[52] <------ Why has to create a file?
- KERNEL32.dll.GetModuleFileNameA Hint[292]
- KERNEL32.dll.GetStringTypeA Hint[339]
- KERNEL32.dll.LCMapStringW Hint[448]
- KERNEL32.dll.LCMapStringA Hint[447]
- KERNEL32.dll.HeapAlloc Hint[409]
- KERNEL32.dll.HeapFree Hint[415]
- KERNEL32.dll.GetModuleHandleA Hint[294]
- KERNEL32.dll.GetStartupInfoA Hint[336]
- KERNEL32.dll.GetCommandLineA Hint[202] <--- Why need to run a command line?
- KERNEL32.dll.GetVersion Hint[372]
- KERNEL32.dll.ExitProcess Hint[125]
- KERNEL32.dll.HeapDestroy Hint[413]
- KERNEL32.dll.HeapCreate Hint[411] <---- DEP setting change trace
- KERNEL32.dll.VirtualFree Hint[703] <---- DEP setting change trace
- KERNEL32.dll.VirtualAlloc Hint[699] <---- DEP setting change trace
- KERNEL32.dll.HeapReAlloc Hint[418] <---- DEP setting change trace
- KERNEL32.dll.TerminateProcess Hint[670] <---Why has to terminate a process? which?
- KERNEL32.dll.GetCurrentProcess Hint[247] <-----Anti Debugging traces
- KERNEL32.dll.UnhandledExceptionFilter Hint[685]
- KERNEL32.dll.FreeEnvironmentStringsA Hint[178]
- KERNEL32.dll.FreeEnvironmentStringsW Hint[179]
- KERNEL32.dll.WideCharToMultiByte Hint[722]
- KERNEL32.dll.GetEnvironmentStrings Hint[262]
- KERNEL32.dll.GetEnvironmentStringsW Hint[264]
- KERNEL32.dll.SetHandleCount Hint[621]
- KERNEL32.dll.GetStdHandle Hint[338]
- KERNEL32.dll.GetFileType Hint[277]
- KERNEL32.dll.RtlUnwind Hint[559]
- KERNEL32.dll.GetCPInfo Hint[191]
- KERNEL32.dll.GetACP Hint[185]
- KERNEL32.dll.GetOEMCP Hint[305]
- KERNEL32.dll.MultiByteToWideChar Hint[484]
- KERNEL32.dll.GetStringTypeW Hint[342]
- USER32.dll.MessageBoxA Hint[446]
- USER32.dll.wsprintfA Hint[684]
- ------------------------------------------------
- Address of very suspicious process above:
- ------------------------------------------------
- 0x406000 GetProcAddress
- 0x406004 LoadLibraryA
- 0x406008 CloseHandle
- 0x406068 GetCurrentProcess
- 0x406020 CreateFileA
- 0x406054 HeapCreate
- 0x40605c VirtualAlloc
- ------------------------------------------------------------
- Detection ratio: 25 / 42
- Analysis date: 2012-01-28 12:44:03 UTC ( 0 分 ago )
- SHA256:84a6adc0975102ca72cdebcf28f9d962d13742aad5980483ded1e38e93162392
- Antivirus Result Update
- ------------------------------------------------------------
- AhnLab-V3 Win32/Flystudio.worm.Gen 20120127
- AntiVir - 20120127
- Antiy-AVL - 20120128
- Avast - 20120128
- AVG BackDoor.FlyAgent.D 20120128
- BitDefender - 20120128
- ByteHero - 20120126
- CAT-QuickHeal Win32.Trojan-Dropper.VBS.p.5 20120127
- ClamAV Trojan.Agent-64034 20120128
- Commtouch W32/FlyStudio.A.gen!Eldorado 20120128
- Comodo TrojWare.Win32.Agent.pkd 20120128
- DrWeb - 20120128
- Emsisoft Trojan-Dropper.Win32.Binder!IK 20120128
- eSafe Win32.TrojanAgent.Dq 20120126
- eTrust-Vet Win32/SillyAutorun.ALB 20120127
- F-Prot W32/FlyStudio.A.gen!Eldorado 20120127
- F-Secure Trojan:W32/Agent.DQOD 20120128
- Fortinet W32/BDoor.DRV!tr 20120128
- GData - 20120128
- Ikarus Trojan-Dropper.Win32.Binder 20120128
- Jiangmin - 20120127
- K7AntiVirus Riskware 20120127
- Kaspersky - 20120128
- McAfee BackDoor-DRV.gen.c 20120127
- McAfee-GW-Ed. BackDoor-DRV.gen.c 20120128
- Microsoft - 20120128
- NOD32 Win32/FlyStudio.OHX 20120128
- Norman W32/Suspicious_Gen2.RZVIX 20120127
- nProtect - 20120128
- Panda Trj/CI.A 20120128
- PCTools - 20120128
- Rising - 20120118
- Sophos Troj/Agent-OKI 20120128
- SUPERAntiSpyWr - 20120128
- Symantec WS.Reputation.1 20120128
- TheHacker Trojan/Downloader.Flystudio.gen 20120127
- TrendMicro TROJ_SPNR.15A912 20120128
- Trend-HouseCall TROJ_SPNR.0BLQ11 20120128
- VBA32 - 20120126
- VIPRE Trojan.Win32.Autorun.dm (v) 20120128
- ViRobot - 20120128
- VirusBuster - 20120127
- ------------------------------------------------------------
- =============================================
- 2. NETWORK & DOMAIN REGISTRATION
- =============================================
- ------------------------------------------
- Domain Name: DIYBBB.COM
- ------------------------------------------
- Registrar: XIN NET TECHNOLOGY CORPORATION
- Whois Server: whois.paycenter.com.cn
- Referral URL: http://www.xinnet.com
- Name Server: F1G1NS1.DNSPOD.NET
- Name Server: F1G1NS2.DNSPOD.NET
- Status: ok
- Updated Date: 24-dec-2011
- Creation Date: 28-aug-2010
- Expiration Date: 28-aug-2013
- ------------------------------------------
- Cross Check:
- ------------------------------------------
- Domain Name : diybbb.com
- PunnyCode : diybbb.com
- Creation Date : 2010-08-29 11:00:42
- Updated Date : 2011-12-25 10:27:26
- Expiration Date : 2013-08-29 11:00:39
- ------------------------------------------
- Administrative /Technical/Billing Contact:
- ------------------------------------------
- Name : LIN YAN
- Organization : LIN YAN
- Address : TIANHE QU BUYNOW C1507
- City : GuangZhou
- Province/State : Guangdong
- Country : CN
- Postal Code : 510000
- Phone Number : 86-020-62683253
- Fax : 86-020-62683286
- Email : mimidi@126.com
- -------------------------------------------
- DNS DUMP
- -------------------------------------------
- diybbb.com. 476 IN A 106.187.46.93
- www.diybbb.com. 454 IN A 106.187.46.93
- diybbb.com. 476 IN SOA f1g1ns1.dnspod.net. freednsadmin.dnspod.com. 1324728081 3600 180 1209600 180
- diybbb.com. 476 IN TXT "v=spf1 include:spf.163.com ~all"
- spf.163.com. 17921 IN TXT "v=spf1 include:a.spf.163.com include:b.spf.163.com -all"
- a.spf.163.com. 18000 IN TXT "v=spf1 ip4:220.181.12.0/22 ip4:220.181.31.0/24 ip4:123.125.50.0/24 ip4:220.181.72.0/24 ip4:123.58.178.0/24 ip4:123.58.177.0/24 ip4:42.99.128.0/28 ip4:113.108.225.0/24 ip4:218.107.63.0/24 -all"
- b.spf.163.com. 18000 IN TXT "v=spf1 ip4:176.32.85.45 ip4:176.32.86.149 ip4:46.51.243.229 ip4:176.34.24.103 ip4:176.34.24.136 ip4:176.34.26.118 -all"
- diybbb.com. 476 IN MX 10 mx.ym.163.com.
- diybbb.com. 476 IN NS f1g1ns2.dnspod.net.
- diybbb.com. 476 IN NS f1g1ns1.dnspod.net.
- diybbb.com. 476 IN NS f1g1ns1.dnspod.net.
- diybbb.com. 476 IN NS f1g1ns2.dnspod.net.
- f1g1ns1.dnspod.net. 164000 IN A 119.167.195.6
- f1g1ns1.dnspod.net. 164000 IN A 122.225.217.192
- f1g1ns1.dnspod.net. 164000 IN A 180.153.10.150
- f1g1ns1.dnspod.net. 164000 IN A 183.60.52.217
- f1g1ns2.dnspod.net. 164977 IN A 112.90.143.29
- f1g1ns2.dnspod.net. 164977 IN A 122.225.217.191
- f1g1ns2.dnspod.net. 164977 IN A 180.153.10.151
- f1g1ns2.dnspod.net. 164977 IN A 180.153.162.150
- +-f1g1ns1.dnspod.net (119.167.195.6)
- | +-f1g1ns1.dnspod.net (122.225.217.192)
- | | +-f1g1ns1.dnspod.net (180.153.10.150)
- | | | +-f1g1ns1.dnspod.net (183.60.52.217)
- | | | | +-f1g1ns2.dnspod.net (122.225.217.191)
- | | | | | +-f1g1ns2.dnspod.net (180.153.10.151)
- | | | | | | +-f1g1ns2.dnspod.net (180.153.162.150)
- | | | | | | | +-f1g1ns2.dnspod.net (112.90.143.29)
- | | | | | | | |
- ---------------------------------------------------------------------------------------
- Tracing to diybbb.com[a] via 202.238.95.24, maximum of 1 retries
- 202.238.95.24 (202.238.95.24)
- ---------------------------------------------------------------------------------------
- |\___ c.gtld-servers.net [com] (192.26.92.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) *
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) *
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ b.gtld-servers.net [com] (2001:0503:231d:0000:0000:0000:0002:0030) *
- |\___ b.gtld-servers.net [com] (192.33.14.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) *
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ e.gtld-servers.net [com] (192.12.94.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ f.gtld-servers.net [com] (192.35.51.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) *
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) *
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ k.gtld-servers.net [com] (192.52.178.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ g.gtld-servers.net [com] (192.42.93.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ i.gtld-servers.net [com] (192.43.172.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) *
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) *
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ h.gtld-servers.net [com] (192.54.112.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) *
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ m.gtld-servers.net [com] (192.55.83.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) *
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ a.gtld-servers.net [com] (2001:0503:a83e:0000:0000:0000:0002:0030) *
- |\___ a.gtld-servers.net [com] (192.5.6.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) *
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ j.gtld-servers.net [com] (192.48.79.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- |\___ l.gtld-servers.net [com] (192.41.162.30)
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- | |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- | |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- | \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- \___ d.gtld-servers.net [com] (192.31.80.30)
- |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.162.150) Got authoritative answer
- |\___ f1g1ns2.dnspod.net [diybbb.com] (180.153.10.151) Got authoritative answer
- |\___ f1g1ns2.dnspod.net [diybbb.com] (122.225.217.191) Got authoritative answer
- |\___ f1g1ns2.dnspod.net [diybbb.com] (112.90.143.29) Got authoritative answer
- |\___ f1g1ns1.dnspod.net [diybbb.com] (183.60.52.217) Got authoritative answer [received type is cname]
- |\___ f1g1ns1.dnspod.net [diybbb.com] (180.153.10.150) Got authoritative answer
- |\___ f1g1ns1.dnspod.net [diybbb.com] (122.225.217.192) Got authoritative answer
- \___ f1g1ns1.dnspod.net [diybbb.com] (119.167.195.6) *
- ------------------------------------------
- GENERAL:
- ------------------------------------------
- IP ADDRESS : 106.187.46.93
- REVERSE DNS: 93.46.187.106.in-addr.arpa domain name pointer li389-93.members.linode.com.
- ASNumber : 2516
- Prefix : 106.187.0.0/18
- AS Name : KDDI
- country : Japan
- ISP Info : LINODE LLC
- Traceroute:
- 118.159.225.5 (118.159.225.5) 1.667 ms 11.820 ms 1.442 ms
- otejbb204.kddnet.ad.jp (59.128.7.194) 1.063 ms otejbb203.kddnet.ad.jp (59.128.7.129) 1.030 ms otejbb203.kddnet.ad.jp (59.128.7.193) 1.319 ms
- cm-fcu203.kddnet.ad.jp (124.215.194.180) 2.555 ms 8.531 ms cm-fcu203.kddnet.ad.jp (124.215.194.164) 2.900 ms
- 124.215.199.122 (124.215.199.122) 3.096 ms 3.105 ms 3.323 ms
- li389-93.members.linode.com (106.187.46.93) 3.331 ms 3.074 ms 2.393 ms
- ------------------------------------------
- INTERNET/NETWORK via JPNIC
- ------------------------------------------
- inetnum: 106.187.40.0 - 106.187.47.255
- netname: LINODE
- descr: Linode, LLC
- country: JP
- admin-c: KB2156JP
- tech-c: KB2156JP
- remarks: This information has been partially mirrored by APNIC from
- remarks: JPNIC. To obtain more specific information, please use the
- remarks: JPNIC WHOIS Gateway at
- remarks: http://www.nic.ad.jp/en/db/whois/en-gateway.html or
- remarks: whois.nic.ad.jp for WHOIS client. (The WHOIS client
- remarks: defaults to Japanese output, use the /e switch for English
- remarks: output)
- changed: apnic-ftp@nic.ad.jp 20110714
- changed: apnic-ftp@nic.ad.jp 20110811
- source: JPNIC
- ------------------------------------------
- Contact Information: [担当者情報]
- ------------------------------------------
- a. [JPNICハンドル] KB2156JP
- b. [氏名] Brett Kaplan
- c. [Last, First] Brett, Kaplan
- d. [電子メイル] bKaplan@linode.com
- f. [組織名] Linode, LLC
- g. [Organization] Linode, LLC
- k. [部署]
- l. [Division]
- m. [肩書]
- n. [Title]
- o. [電話番号] +1-609-593-7103
- p. [FAX番号]
- y. [通知アドレス]
- [最終更新] 2011/07/14 14:20:07(JST)
- db-staff@nic.ad.jp
- Additional Contacts:
- contact information for 106.187.46.93
- dns@linode.com (responsible for linode.com,46.187.106.in-addr.arpa)
- read-txt-record-of-zone-first-dns-admin@apnic.net (responsible for 106.in-addr.arpa)
- nstld@iana.org (responsible for in-addr.arpa,in-addr-servers.arpa)
- dns-admin@apnic.net (responsible for apnic.net)
- hostmaster@lacnic.net (responsible for lacnic.net)
- bind@arin.net (responsible for arin.net)
- dns@ripe.net (responsible for ripe.net)
- ------------------------------------------
- INTERNET/NETWORK via APNIC
- ------------------------------------------
- inetnum: 106.128.0.0 - 106.191.255.255
- netname: KDDI
- descr: KDDI CORPORATION
- descr: GARDEN AIR TOWER,3-10-10,Iidabashi,Chiyoda-ku,Tokyo
- country: JP
- admin-c: JNIC1-AP
- tech-c: JNIC1-AP
- status: ALLOCATED PORTABLE
- remarks: Email address for spam or abuse complaints abuse@dion.ne.jp
- changed: hm-changed@apnic.net 20110315
- mnt-irt: IRT-JPNIC-JP
- mnt-by: MAINT-JPNIC
- mnt-lower: MAINT-JPNIC
- source: APNIC
- =================================
- 3. BEHAVIOUR ANALYSIS
- =================================
- * Load-time Dll:
- C:\WINDOWS\system32\ntdll.dll 0x7C900000 0x000AF000
- C:\WINDOWS\system32\kernel32.dll 0x7C800000 0x000F6000
- C:\WINDOWS\system32\USER32.dll 0x7E410000 0x00091000
- C:\WINDOWS\system32\GDI32.dll 0x77F10000 0x00049000
- * Run-time Dlls:
- C:\DOC~\..1\Temp\E_N4\krnln.fnr 0x10000000 0x0011A000
- C:\WINDOWS\system32\COMCTL32.dll 0x5D090000 0x0009A000
- C:\WINDOWS\system32\OLEPRO32.DLL 0x5EDD0000 0x00017000
- C:\WINDOWS\system32\WS2HELP.dll 0x71AA0000 0x00008000
- C:\WINDOWS\system32\WS2_32.dll 0x71AB0000 0x00017000
- C:\WINDOWS\system32\WINSPOOL.DRV 0x73000000 0x00026000
- C:\WINDOWS\system32\DCIMAN32.DLL 0x73BC0000 0x00006000
- C:\WINDOWS\system32\MSCTF.dll 0x74720000 0x0004C000
- :
- * Registry Created:
- HKU\S-1-5-21-842925246-1425521274-308236825-500\Software\Microsoft\Multimedia\DrawDib
- * Modified:
- HKU\S-1-5-21-842925246-1425521274-308236825-500\Software\Microsoft\Multimedia\DrawDib
- ===> vga.drv 800x600x16(565 0) 31,31,31,31
- * Registry Malware Directories Created:
- %Temp% \E_N4
- %System% \13E92A\
- * Malware Files Dropped
- %Temp% \E_N4
- %Temp% \E_N4\EThread.fne (Malware apps Interface)
- %Temp% \E_N4\iext6.fne
- %Temp% \E_N4\krnln.fnr (Malware kernel support library)
- %Temp% \E_N4\shell.fne (Malware shell support library)
- %Temp% \E_N4\spec.fne
- You can view these drops at this Address:
- 0000000090B8 0000004090B8 0 krnln
- 0000000090BE 0000004090BE 0 d09f2340818511d396f6aaf844c7e325
- 0000000090F2 0000004090F2 0 EThread
- 0000000090FA 0000004090FA 0 5F99C1642A2F4e03850721B4F5D7C3F8
- 000000009131 000000409131 0 A512548E76954B6E92C21055517615B0
- 000000009165 000000409165 0 shell
- 00000000916B 00000040916B 0 52F260023059454187AF826A3C07AF2A
- 0000000091A7 0000004091A7 0 iext6
- 0000000091AD 0000004091AD 0 {E60056EA-07A8-4bf5-B6F0-DF05DE6FAE1F}
- Malware Files Copied:
- %System%\ 13E92A\EThread.fne
- %System%\ 13E92A\iext6.fne
- %System%\ 13E92A\krnln.fnr
- %System%\ 13E92A\shell.fne
- %System%\ 13E92A\spec.fne
- Dropped Malware Components Malware Detection Reputations:
- -----------------------------------------------------------
- %Temp%\E_N4\EThread.fne (previous sample: internet.fne)
- %System%\13E92A\EThread.fne
- Size: 184,320 bytes
- MD5: 0xC93E19032EFD345023E240A0E9F570BA
- SHA-1: 0xBC7AD7302513317F3C8663FAC8328A9DA588252D
- Verdict:
- Trojan.Galapoper [PCTools]
- Trojan.Galapoper.A [Symantec]
- Tool-EPLLib.gen.b [McAfee]
- Mal/EncPk-NB [Sophos]
- possible-Threat.HackTool.EPLLib [Ikarus]
- packed with PE-Crypt.CF [Kaspersky Lab]
- -----------------------------------------------------------
- %Temp%\E_N4\krnln.fnr
- %System%\13E92A\krnln.fnr
- Size: 701,824 bytes
- MD5: 0x6E32451019FDB76AB888F6FB5F5836E0
- SHA-1: 0xF9E495276C9AD994DDBE0D1716F37081266273A9
- Verdict:
- Trojan.Gen [PCTools]
- Trojan.Gen [Symantec]
- Mal/EncPk-NB [Sophos]
- Trojan.Win32.Gendal [Ikarus]
- packed with PE-Crypt.CF [Kaspersky Lab]
- -----------------------------------------------------------
- %Temp%\E_N4\shell.fne
- %System%\13E92A\shell.fne
- Size: 40,960 bytes
- MD5: 0xA82A3F811F1A01C9EEBF7E76C8C3CD6C
- SHA-1: 0x96C026497D308450E460F058E3B0B68D75C0684A
- Verdict:
- Trojan.Generic [PCTools]
- Trojan Horse [Symantec]
- Generic PWS.y!hv.s [McAfee]
- Mal/EncPk-NB [Sophos]
- Trojan:Win32/Orsam!rts [Microsoft]
- Trojan.Peed [Ikarus]
- Win-Trojan/Xema.variant [AhnLab]
- packed with PE-Crypt.CF [Kaspersky Lab]
- -----------------------------------------------------------
- %Temp%\E_N4\spec.fne
- %System%\13E92A\spec.fne
- Size: 73,728 bytes
- MD5: 0x2C6AECDD5D8D812C5BF1D678252B1901
- SHA-1: 0x65976048B550BDE89CEC8B45CF40060688C96A12
- Verdict:
- Trojan.Generic [PCTools]
- Trojan Horse [Symantec]
- Vundo.gen.cg [McAfee]
- Mal/EncPk-NB [Sophos]
- Trojan:Win32/Trabin!rts [Microsoft]
- Trojan.Peed [Ikarus]
- Win-Trojan/Xema.variant [AhnLab]
- packed with PE-Crypt.CF [Kaspersky Lab]
- -----------------------------------------------------------
- Similar Case Reference same root malware:
- http://www.threatexpert.com/report.aspx?md5=c6b7fc243b0c298388bbf24ec85574a4
- http://www.threatexpert.com/report.aspx?md5=ba7010c0ee3832b7ff4f1fe759b7b44e
- NETWORK ACTIVITIES:
- In codes there were registered attempts to establish connection with the remote hosts.
- --------------------------------
- Remote Host Port Number
- ---------------------------------
- 173.252.216.29 80
- 96.44.133.98 80
- ---------------------------------
- (GET) HTTP/1.1
- ---------------------------------
- 1. hxxp://www.aikest.com/reg.asp?a=5331 (Cracked)
- 2. hxxp://www.chuangqilm.com/iclk/?zoneid=7887&uid=5331
- 3. (unCracked URL....)
- 4. (unCracked URL....)
- 5. (unCracked URL....)
- -----------------------------------------------------------
- ANALYZED BY ZERODAY JAPAN http://0day.jp
- IN OPERATION CLEAN JAPAN #OCJP-003
- http://unixfreaxjp.blogspot.com
- BY HENDRIK ADRIAN (VT/Twitter: @unixfreaxjp )
RAW Paste Data