**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =56b50e4392098ba4f121a2a26e273b0a **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |56b50e4392098ba4f121a2a26e273b0a|30936a12e023ad4ee31e188cb204186124c461df|af34ae1c20358edd1ec02140ad0e277ab85a6f577b02540521f9b1d4e14084d1|1536:xHQJTNrhhlliP452/8QVOvvBSUspjnhhlzk6tb4gHtd6h7FEHMqH1Ddnb:xwJflT2pMv0DV/b4A|106496___| **** File_Results **** _________ |File_Name| |222.exe__| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ______________________________ |AV_Alert____________|AV_Vendor| |N/A_________________|Symantec_| |Generic.dx!bank_____|McAfee___| |Trojan.Win32.VB.auou|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ___________________________________________ |Path_______________|File_Name______________| |c:/WINDOWS/Prefetch|AUTOIT3.EXE-32361418.pf| |c:/WINDOWS/Prefetch|REGSHOT.EXE-010A5EE6.pf| |c:/WINDOWS/Prefetch|SANDNET.EXE-2012C478.pf| |c:/WINDOWS_________|services.exe___________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________ |Action__|Path__________________________________|File_Name_______________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________|WMIPRVSE.EXE-28F301A9.pf| |modified|c:/WINDOWS/system32/config____________|software.LOG____________| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP_______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** ________________________________________________________________________________________________ |Action|Path______________________________________________|Val_Name____|Val_Data_________________| |added_|HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Run|services.exe|"C:/WINDOWS/services.exe"| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ____________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________|Val_Name|Val_Data________________________________________________________________________|Mod_Val_Data____________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG|Seed____|52_62_CF_4D_AB_74_FB_9E_9F_7F_42_1A_C0_70_B7_2A_86_EA_BC_54_43_3C_9D_E0_5B_74_F4|9B_C9_83_08_ED_0A_CB_23_18_A9_D8_10_AC_61_FB_E3_AC_48_DE_CA_41_12_EF_E6_43_B7_1F| **** DNS_Results **** ________________________________________________________________________ |DNS_____________________________|DNS_Response___________________________| |peru.wwwhost.biz________________|Standard_query_response_A_92.242.140.35| |continental.wwwhost.biz_________|Standard_query_response_A_92.242.140.35| |nacion.wwwhost.biz______________|Standard_query_response_A_92.242.140.35| |ecua-chi-bo.wwwhost.biz_________|Standard_query_response_A_92.242.140.35| |argentina.americanunfinished.com|Standard_query_response_A_92.242.140.35| **** URL_Results **** _________________________________________________________ |DstIP|HTTP_HOST|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| **** ARGUS_DATA_Results **** _______________________________________________________________ |Time|Date|Protocol|SrcIP|DstIP|Dir|Flags|Sport|Dport|Pkts|Bytes| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|