**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =9fba9339365e51dd06b0285a0159e1c3 **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |9fba9339365e51dd06b0285a0159e1c3|dc2ee7f63d6d4a1c2330a45ff623beed813e4f59|8990c5dc43db3e97316a2489a7b2db51c8c149fecf04156cf7fcabfac7535d5d|6144:+8U2qy6rRZb7jxGYKSTJDPM83llq9v+evY56asFm8Yc01rI0GK95:gzy6rRxE8UOlwvVvY5hom8|356851___| **** File_Results **** _____________________________ |File_Name____________________| |1289144%5Fx352fsd.640x480.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** _______________________________________________ |AV_Alert_____________________________|AV_Vendor| |Trojan.Gen___________________________|Symantec_| |Artemis!125A378E569A_________________|McAfee___| |Trojan-Ransom.Win32.PornoBlocker.aaif|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ___________________________________________________________ |Path___________________________|File_Name__________________| |c:/WINDOWS/Prefetch____________|SANDNET.EXE-2012C478.pf____| |c:/WINDOWS/Prefetch____________|START1.EXE-2DDDAD76.pf_____| |c:/WINDOWS/system32/drivers/etc|127014_128820_f_640x480.jpg| |c:/WINDOWS/system32/drivers/etc|file.exe___________________| |c:/WINDOWS/system32/drivers/etc|h?sts______________________| |c:/WINDOWS/system32/drivers/etc|start1.exe_________________| |c:_____________________________|netstat_post.txt___________| |c:_____________________________|taskv_post.txt_____________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** _______________________________________________________________________ |Action__|Path__________________________________|File_Name______________| |modified|c:/Documents_and_Settings/dmc73144____|ntuser.dat.LOG_________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf_| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf_____| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf__| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf___| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf_| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts__________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP___________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ___________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________|Val_Name|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG|Seed____|23_76_70_31_B7_BC_1B_99_34_89_76_93_E8_D1_4E_F2_67_69_BC_D2_22_F3_B0_B9_D0_AD_A7|05_F7_8E_28_BA_A7_76_00_4C_25_C8_47_A4_89_3E_9B_7F_13_11_00_15_0C_BC_E8_C4_B2_A| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** ______________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT|PROTOCOL| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--______|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |17______|1_______|0_______|175______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |1900_|17______|1_______|0_______|175______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |14:07:23|2011-06-05|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|1___|175__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|