**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =904f39dbccb069b41ed8eb839497ca65 **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |904f39dbccb069b41ed8eb839497ca65|f7c7baea61b6d7299fdb1b10c4f5b6f02b04f1a6|4642a8c82dbca84aab30bdf2c3b77b30d162e017c1171c090d5fd9722b913190|12288:/V5OEUK09uUrSXjbWXoE80AZY8szBJS+TfW/ZB/ingW7mN868E888888888888WU:5L09brSHW|825344___| **** File_Results **** _________ |File_Name| |efhtB.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ________________________________ |AV_Alert______________|AV_Vendor| |Trojan.Gen____________|Symantec_| |Generic_______________|McAfee___| |Trojan.Win32.Qhost.rlc|Kaspersky| **** Folders_(Added)_-_ICC_Results **** _______________________________________________________________ |Path_______________________________________________|Folder_Name| |c:/Documents_and_Settings/dmc73144/Application_Data|OTDJbOiW___| **** Files_(Added)_-_ICC_Results **** ____________________________________________________________________________________ |Path________________________________________________________|File_Name______________| |c:/Documents_and_Settings/dmc73144/Application_Data/OTDJbOiW|sxJhd__________________| |c:/WINDOWS/Prefetch_________________________________________|SANDNET.EXE-2012C478.pf| |c:/WINDOWS/system32/drivers/etc_____________________________|h?sts__________________| |c:__________________________________________________________|netstat_post.txt_______| |c:__________________________________________________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________ |Action__|Path__________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144____|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________|ATTRIB.EXE-39EAFB02.pf__| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP_______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ___________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________|Val_Name|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG|Seed____|6D_5A_3A_88_62_B0_5D_70_31_9B_B3_46_68_5D_38_A7_FE_7F_53_8C_CF_D0_7F_58_21_5C_DD|C7_7E_40_78_54_6F_EC_B2_B9_60_9B_17_95_35_07_D6_A5_60_BC_91_69_2B_96_6C_68_25_A| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** ______________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |17______|2_______|0_______|350______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |1900_|17______|2_______|0_______|350______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |16:46:33|2011-06-25|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|2___|350__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|