**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =08d100768bee6ba22fbc7583049698c3 **** Malware_Report_-_Results **** _________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH__________________________________________________________|File_Size| |08d100768bee6ba22fbc7583049698c3|64ff9444f173cd19cdd31bf7bd1c716f63ced81f|a4a5b5767ab8308493ec7e4985805a7af09a6b32f331e19030acbe85ad0e10ba|1536:WrjvZfuH2JcrmrnWLYC7ZOn5m6pEGckMst+xzx92XGV1:qUH2OrAYO8k1kzxMWT|90213____| **** File_Results **** ____________ |File_Name___| |Postales.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ________________________________ |AV_Alert______________|AV_Vendor| |N/A___________________|Symantec_| |N/A___________________|McAfee___| |Trojan.Win32.Llac.acaz|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ___________________________________________ |Path_______________|File_Name______________| |c:/WINDOWS/Prefetch|SANDNET.EXE-2012C478.pf| |c:/WINDOWS_________|scssrr.exe_____________| |c:_________________|netstat_post.txt_______| |c:_________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** _______________________________________________________________________ |Action__|Path__________________________________|File_Name______________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf_| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf_____| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf__| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf___| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf_| |modified|c:/WINDOWS/system32/config____________|software.LOG___________| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts__________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP___________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ___________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________|Val_Name|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG|Seed____|99_2C_D9_54_7C_8A_B1_4B_D8_AC_A7_92_E0_19_29_FA_6E_4C_E3_93_EE_9A_E6_24_2E_FA_44|CE_7C_FD_66_62_2D_81_7B_94_6F_48_94_03_F5_C0_8D_C8_29_26_A3_A2_9A_91_3A_E5_06_1| **** DNS_Results **** ______________________________________________________________ |DNS__________________|DNS_Response____________________________| |krikoperurlz.mooo.com|Standard_query_response_A_200.108.108.43| **** URL_Results **** ______________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |17______|4_______|0_______|700______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |1900_|17______|4_______|0_______|700______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |04:19:25|2011-06-27|17______|10.10.10.7|239.255.255.250|->_|e____|4002_|1900_|2___|350__| |04:19:31|2011-06-27|17______|10.10.10.7|239.255.255.250|->_|e____|4002_|1900_|1___|175__| |04:19:34|2011-06-27|17______|10.10.10.7|239.255.255.250|->_|e____|413__|1900_|1___|175__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|