**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =3e14ea977fc226d48e451d465fab1001 **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |3e14ea977fc226d48e451d465fab1001|e56cfc3cbdfc73003b647eea4a16c4a4fa8d59d6|74fc269ef1c7246473668413100a0e87150b025cd9ed4606294501ce8c2ef5db|768:WknhiXc9xtELffXecAuinWpXT1EswoWpJdBT5ZHVeyIKyrkmcYMeEdpuc5DE:Wsws9xtcf/zin+X|73728____| **** File_Results **** _________ |File_Name| |5.gif.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ______________________________________ |AV_Alert____________________|AV_Vendor| |Infostealer.Bancos__________|Symantec_| |Generic_____________________|McAfee___| |Trojan-Banker.Win32.Qhost.kq|Kaspersky| |Suspicious.Insight__________|Symantec_| |N/A_________________________|McAfee___| |N/A_________________________|Kaspersky| **** Folders_(Added)_-_ICC_Results **** __________________________________________________________________________________________________ |Path__________________________________________________________________________________|Folder_Name| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|ITB2CJ0C___| **** Files_(Added)_-_ICC_Results **** _______________________________________________________________________________________________________________________ |Path___________________________________________________________________________________________|File_Name______________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp_________________________________________|~DF6F09.tmp____________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5/ITB2CJ0C|atual[1].htm___________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5/ITB2CJ0C|desktop.ini____________| |c:/WINDOWS/Prefetch____________________________________________________________________________|SANDNET.EXE-2012C478.pf| |c:/WINDOWS/system32____________________________________________________________________________|atual.txt______________| |c:/WINDOWS/system32____________________________________________________________________________|local.txt______________| |c:_____________________________________________________________________________________________|netstat_post.txt_______| |c:_____________________________________________________________________________________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** _______________________________________________________________________________________________________________________ |Action__|Path__________________________________________________________________________________|File_Name______________| |modified|c:/Documents_and_Settings/dmc73144/Cookies____________________________________________|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5_________________|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|index.dat______________| |modified|c:/Documents_and_Settings/dmc73144____________________________________________________|ntuser.dat.LOG_________| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|CMD.EXE-087B4001.pf____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|HSTART.EXE-221D72BF.pf_| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|NETSTAT.EXE-2B2B4428.pf| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SH.EXE-00254D2B.pf_____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SLEEP.EXE-094A3D2A.pf__| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SSHD.EXE-298CA236.pf___| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SWITCH.EXE-0496EC21.pf_| |modified|c:/WINDOWS/system32/config____________________________________________________________|software.LOG___________| |modified|c:/WINDOWS/system32/drivers/etc_______________________________________________________|hosts__________________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|INDEX.MAP______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|MAPPING.VER____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|MAPPING1.MAP___________| |modified|c:/WINDOWS/system32/wbem/Repository/FS________________________________________________|OBJECTS.MAP____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________________________________________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG________________________________________________________________________________|Seed_______________|B8_78_E0_9E_DD_91_A2_A1_5B_7D_56_92_64_7A_B6_7D_D8_9D_55_1E_6A_86_B7_BD_27_42_01|37_28_7A_F1_D9_2F_C3_57_79_24_00_22_B7_8E_56_9D_0A_A1_1C_71_3E_8D_97_08_EF_CF_B| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet_Settings/Connections|SavedLegacySettings|3C_00_00_00_15_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_00|3C_00_00_00_16_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_0| **** DNS_Results **** _____________________________________________________ |DNS__________|DNS_Response___________________________| |acpbdf.com.br|Standard_query_response_A_200.219.214.6| **** URL_Results **** _______________________________________________________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI_|HTTP_USER_AGENT________________________________________|PROTOCOL| |200.219.214.6__|acpbdf.com.br_______|/images/atual.txt|Mozilla/4.0_(compatible;_MSIE_6.0;_Windows_NT_5.1;_SV1)|0x06____| |239.255.255.250|239.255.255.250:1900|*________________|--blank--______________________________________________|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|5_______|4_______|489______|515______| |17______|2_______|0_______|350______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |80___|6_______|5_______|4_______|489______|515______| |1900_|17______|2_______|0_______|350______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |15:40:19|2010-05-02|6_______|10.10.10.7|200.219.214.6__|->_|e____|12___|80___|9___|1004_| |15:45:40|2010-05-02|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|2___|350__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|