Malware Report - Results

This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection.

Malware Search Criteria:
  • MD5 =cbc51ed4b0d5d55bfe0ef487f03c0b81

  • Malware Report - Results

    File MD5SumSHA1SUMSHA256SUMFUZZY HASHFile Size
    cbc51ed4b0d5d55bfe0ef487f03c0b81cfae8bab224a62bb926336721583108460a75215b65384650379383cbbb924a5915facd8ed8af496bb945464142fd0238cdeb6e2768:JNfH5SlBV8qPl0CD6jjEwRLzmk0juaqs2o+4ZH98iZhifZ/0FM:rfZwGqd0y6nEwRLSk0bqLuH9837376

    File Results

    File Name
    ml1.txt.exe

    SNORT Results

    Snort ClassSnort AlertCount
    Misc AttackET RBN Known Russian Business Network IP TCP (289)4
    Misc AttackET DROP Spamhaus DROP Listed Traffic Inbound1

    AV Results

    AV AlertAV Vendor
    Backdoor.TrojanSymantec
    N/AMcAfee
    Backdoor.Win32.VB.njoKaspersky
    Trojan.DropperSymantec
    GenericMcAfee
    Rootkit.Win32.Tent.cosKaspersky
    Artemis!CBC51ED4B0D5McAfee

    Folders (Added) - ICC Results

    PathFolder Name

    Files (Added) - ICC Results

    PathFile Name
    c:/Documents and Settings/dmc73144/Local Settings/Tempnftmgqxl.bat
    c:/Documents and Settings/dmc73144/Local Settings/Tempu5ck1r.exe
    c:/Documents and Settings/dmc73144/Local Settings/Temp~DFDC85.tmp
    c:/WINDOWS/PrefetchNET.EXE-01A53C2F.pf
    c:/WINDOWS/PrefetchNET1.EXE-029B9DB4.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/PrefetchSC.EXE-012262AF.pf
    c:/WINDOWS/PrefetchU5CK1R.EXE-298971A8.pf
    c:/WINDOWS/system328lwh0u.log
    c:netstat_post.txt
    c:tasksvc_post.txt
    c:taskv_post.txt

    Files (Deleted) - ICC Results

    ActionPathFile Name

    Files (Changed) - ICC Results

    ActionPathFile Name
    modifiedc:/Documents and Settings/dmc73144/Cookiesindex.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/History/History.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/Documents and Settings/LocalServicentuser.dat.LOG
    modifiedc:/WINDOWS/PrefetchCMD.EXE-087B4001.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchSH.EXE-00254D2B.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/system32/configsoftware.LOG
    modifiedc:/WINDOWS/system32/configsystem.LOG
    modifiedc:/WINDOWS/system32/drivers/etchosts
    modifiedc:/WINDOWS/system32/wbem/Logswbemess.log
    modifiedc:/WINDOWS/system32/wbem/Logswmiprov.log

    Registry Keys (Added) - ICC Results

    ActionPath

    Registry Values (Added) - ICC Results

    ActionPathVal_NameVal_Data

    Registry Values (Deleted) - ICC Results

    ActionPathVal_NameVal_TypeMod_Val_TypeVal_DataMod_Val_Data

    Registry Values (Changed) - ICC Results

    ActionPathVal_NameVal_DataMod_Val_Data
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeed85 81 82 98 01 41 B5 5F 02 C0 08 85 26 D0 3B 77 0B 15 0C E5 11 DC 17 C1 A0 67 D7 8D 26 40 A8 73 50 30 B7 4E 0C D0 D4 F5 D5 71 E9 82 46 45 6B 15 A4 03 7A A1 84 F
    modifiedHKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProfileList/S-1-5-19RefCount0x00000002 0x00000001
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccess/EpochEpoch0x00000104 0x00000105
    modifiedHKLM/SYSTEM/ControlSet001/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/EpochEpoch0x00000104 0x00000105
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet Settings/ConnectionsSavedLegacySettings3C 00 00 00 15 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 3C 00 00 00 17 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformationProgramCount0x00000002 0x00000001

    DNS Results

    DNSDNS Response
    justoldleft.ruStandard query response A 91.213.29.174

    URL Results

    DstIPHTTP_HOSTHTTP_REQUEST_URIHTTP_USER_AGENTPROTOCOL
    91.213.29.174justoldleft.ru/list.php?c=B4AC885F94224AE64DAAC6EE0346C213D049B58E0B3969C1DC9ECA9D5FF7F6D9DFE10E13F3845D3386FFC45E0D4897B5778D4CBB9FE6A5F44337&v=2&t=0.2226221Mozilla/4.0 (compatible; MSIE 6.0.2900.2180; Windows NT 5.1.2600)0x06
    91.213.29.174justoldleft.ru/list.php?c=AEB679AE48FE379B886FAD85A7E26FBE20B9615A596B2F879FDDE7B0FA52F2DDA19F3F22186F5F31433ADE44E8AD280A7D87AF5838413263B3C7&v=2&t=0.0194971Mozilla/4.0 (compatible; MSIE 6.0.2900.2180; Windows NT 5.1.2600)0x06
    91.213.29.174justoldleft.ru/list.php?c=BBA37FA8B006923EBE59341C96D311C0EF76D8E3457774DCB0F2164149E16C43013FBBA6CEB9C0AE99E075EF581D371535CFDB2CB5CCB8E93145&v=2&t=0.529339Mozilla/4.0 (compatible; MSIE 6.0.2900.2180; Windows NT 5.1.2600)0x06
    91.213.29.174justoldleft.ru/list.php?c=2C3496414FF9AE02A24580A8E9AC13C218816A5183B181295A18451255FD1F3082BC0D107D0A650BB2CBAB314F0A270509F31BECED94CF9ECFBB&v=2&t=0.4483148Mozilla/4.0 (compatible; MSIE 6.0.2900.2180; Windows NT 5.1.2600)0x06

    ARGUS PROTOCOL Results

    PROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    6201624272060

    ARGUS DPORT Results

    DPORTPROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    806201624272060

    ARGUS DATA Results

    TimeDateProtocolSrcIPDstIPDirFlagsSportDportPktsBytes
    10:32:042011-03-25610.10.10.791.213.29.174-> e 438091122
    10:33:102011-03-25610.10.10.791.213.29.174-> e 5788091122
    10:34:192011-03-25610.10.10.791.213.29.174-> e 1118091121
    10:35:232011-03-25610.10.10.791.213.29.174-> e 7708091122

    Packer Results

    Packer Name

    HoneyTrap Results

    Honey Trap Log File Location

    PTFB Results

    PTFB Log File Location