**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =512336a0332228ade6175f2a6625a0bb **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |512336a0332228ade6175f2a6625a0bb|0a23f5003558f8b3a30191dc5c492cde1efef91d|b4f58857bb9e17a0348d7f725c60656a05e58670f4ae1307987164737e3554e5|1536:nOhplcsHv1X6n0zAl0T8zSXmxHPK6cSQTTwDFnmXnpnVB+9I3J2D0gIIMo4JlG/C:nOXpHv1O0A|98304____| **** File_Results **** __________ |File_Name_| |loader.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ________________________________________ |AV_Alert______________________|AV_Vendor| |Suspicious.Cloud.5____________|Symantec_| |Tool-WGe______________________|McAfee___| |N/A___________________________|Kaspersky| |Trojan.Gen____________________|Symantec_| |Artemis!512336A03322__________|McAfee___| |Trojan-Downloader.BAT.Banload.|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ___________________________________________ |Path_______________|File_Name______________| |c:/WINDOWS/Prefetch|SANDNET.EXE-2012C478.pf| |c:/WINDOWS/Prefetch|WGET.EXE-32C287FB.pf___| |c:_________________|netstat_post.txt_______| |c:_________________|tasksvc_post.txt_______| |c:_________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________ |Action__|Path__________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144____|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP_______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING1.MAP____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** __________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path_______________________________________________________________|Val_Name____|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG___________________________|Seed________|01_C4_AB_A9_40_37_02_30_5B_F3_7C_60_CA_EB_0E_DA_D4_48_8B_FD_E7_DB_CF_A3_63_EB_8D|E2_89_1F_14_EE_77_C0_97_8C_C3_18_83_D1_54_A5_C4_64_7C_AB_0E_8C_57_19_1A_14_21_A| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformation|ProgramCount|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| **** DNS_Results **** _______________________________________________ |DNS___|DNS_Response____________________________| |bit.ly|Standard_query_response_A_168.143.172.53| **** URL_Results **** __________________________________________________________________ |DstIP_________|HTTP_HOST|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |168.143.172.53|bit.ly:80|/flppQp_________|Wget/1.5.3.1___|0x06____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|15______|14______|976______|3572_____| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |80___|6_______|15______|14______|976______|3572_____| **** ARGUS_DATA_Results **** _______________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP_________|Dir|Flags|Sport|Dport|Pkts|Bytes| |01:13:21|2011-04-07|6_______|10.10.10.7|168.143.172.53|->_|e____|497__|80___|14__|2283_| |01:13:26|2011-04-07|6_______|10.10.10.7|168.143.172.53|->_|e____|497__|80___|10__|1965_| |01:13:31|2011-04-07|6_______|10.10.10.7|168.143.172.53|->_|e____|497__|80___|5___|300__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|