**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =cbc51ed4b0d5d55bfe0ef487f03c0b81 **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |cbc51ed4b0d5d55bfe0ef487f03c0b81|cfae8bab224a62bb926336721583108460a75215|b65384650379383cbbb924a5915facd8ed8af496bb945464142fd0238cdeb6e2|768:JNfH5SlBV8qPl0CD6jjEwRLzmk0juaqs2o+4ZH98iZhifZ/0FM:rfZwGqd0y6nEwRLSk0bqLuH98|37376____| **** File_Results **** ___________ |File_Name__| |ml1.txt.exe| **** SNORT_Results **** ____________________________________________________________________ |Snort_Class|Snort_Alert_______________________________________|Count| |Misc_Attack|ET_RBN_Known_Russian_Business_Network_IP_TCP_(289)|4____| |Misc_Attack|ET_DROP_Spamhaus_DROP_Listed_Traffic_Inbound______|1____| **** AV_Results **** ________________________________ |AV_Alert______________|AV_Vendor| |Backdoor.Trojan_______|Symantec_| |N/A___________________|McAfee___| |Backdoor.Win32.VB.njo_|Kaspersky| |Trojan.Dropper________|Symantec_| |Generic_______________|McAfee___| |Rootkit.Win32.Tent.cos|Kaspersky| |Artemis!CBC51ED4B0D5__|McAfee___| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ______________________________________________________________________________ |Path__________________________________________________|File_Name______________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp|nftmgqxl.bat___________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp|u5ck1r.exe_____________| |c:/Documents_and_Settings/dmc73144/Local_Settings/Temp|~DFDC85.tmp____________| |c:/WINDOWS/Prefetch___________________________________|NET.EXE-01A53C2F.pf____| |c:/WINDOWS/Prefetch___________________________________|NET1.EXE-029B9DB4.pf___| |c:/WINDOWS/Prefetch___________________________________|SANDNET.EXE-2012C478.pf| |c:/WINDOWS/Prefetch___________________________________|SC.EXE-012262AF.pf_____| |c:/WINDOWS/Prefetch___________________________________|U5CK1R.EXE-298971A8.pf_| |c:/WINDOWS/system32___________________________________|8lwh0u.log_____________| |c:____________________________________________________|netstat_post.txt_______| |c:____________________________________________________|tasksvc_post.txt_______| |c:____________________________________________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________________________________________________________ |Action__|Path__________________________________________________________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144/Cookies____________________________________________|index.dat_______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/History/History.IE5_________________|index.dat_______________| |modified|c:/Documents_and_Settings/dmc73144/Local_Settings/Temporary_Internet_Files/Content.IE5|index.dat_______________| |modified|c:/Documents_and_Settings/dmc73144____________________________________________________|ntuser.dat.LOG__________| |modified|c:/Documents_and_Settings/LocalService________________________________________________|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________________________________________________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/system32/config____________________________________________________________|software.LOG____________| |modified|c:/WINDOWS/system32/config____________________________________________________________|system.LOG______________| |modified|c:/WINDOWS/system32/drivers/etc_______________________________________________________|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Logs_________________________________________________________|wbemess.log_____________| |modified|c:/WINDOWS/system32/wbem/Logs_________________________________________________________|wmiprov.log_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________________________________________________________________________________________|Val_Name___________|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG________________________________________________________________________________|Seed_______________|85_81_82_98_01_41_B5_5F_02_C0_08_85_26_D0_3B_77_0B_15_0C_E5_11_DC_17_C1_A0_67_D7|8D_26_40_A8_73_50_30_B7_4E_0C_D0_D4_F5_D5_71_E9_82_46_45_6B_15_A4_03_7A_A1_84_F| |modified|HKLM/SOFTWARE/Microsoft/Windows_NT/CurrentVersion/ProfileList/S-1-5-19__________________________________________________|RefCount___________|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/SharedAccess_________________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/SharedAccess/Epoch___________________________________________________________________|Epoch______________|0x00000104______________________________________________________________________|0x00000105_____________________________________________________________________| |modified|HKLM/SYSTEM/ControlSet001/Services/wscsvc_______________________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/SharedAccess_____________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/Epoch_______________________________________________________________|Epoch______________|0x00000104______________________________________________________________________|0x00000105_____________________________________________________________________| |modified|HKLM/SYSTEM/CurrentControlSet/Services/wscsvc___________________________________________________________________________|Start______________|0x00000002______________________________________________________________________|0x00000004_____________________________________________________________________| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet_Settings/Connections|SavedLegacySettings|3C_00_00_00_15_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_00|3C_00_00_00_17_00_00_00_01_00_00_00_00_00_00_00_00_00_00_00_00_00_00_00_04_00_0| |modified|HKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformation_____________________________________________________|ProgramCount_______|0x00000002______________________________________________________________________|0x00000001_____________________________________________________________________| **** DNS_Results **** ______________________________________________________ |DNS___________|DNS_Response___________________________| |justoldleft.ru|Standard_query_response_A_91.213.29.174| **** URL_Results **** ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |DstIP________|HTTP_HOST_____|HTTP_REQUEST_URI________________________________________________________________________________________________________________________________|HTTP_USER_AGENT__________________________________________________|PROTOCOL| |91.213.29.174|justoldleft.ru|/list.php?c=B4AC885F94224AE64DAAC6EE0346C213D049B58E0B3969C1DC9ECA9D5FF7F6D9DFE10E13F3845D3386FFC45E0D4897B5778D4CBB9FE6A5F44337&v=2&t=0.2226221|Mozilla/4.0_(compatible;_MSIE_6.0.2900.2180;_Windows_NT_5.1.2600)|0x06____| |91.213.29.174|justoldleft.ru|/list.php?c=AEB679AE48FE379B886FAD85A7E26FBE20B9615A596B2F879FDDE7B0FA52F2DDA19F3F22186F5F31433ADE44E8AD280A7D87AF5838413263B3C7&v=2&t=0.0194971|Mozilla/4.0_(compatible;_MSIE_6.0.2900.2180;_Windows_NT_5.1.2600)|0x06____| |91.213.29.174|justoldleft.ru|/list.php?c=BBA37FA8B006923EBE59341C96D311C0EF76D8E3457774DCB0F2164149E16C43013FBBA6CEB9C0AE99E075EF581D371535CFDB2CB5CCB8E93145&v=2&t=0.529339_|Mozilla/4.0_(compatible;_MSIE_6.0.2900.2180;_Windows_NT_5.1.2600)|0x06____| |91.213.29.174|justoldleft.ru|/list.php?c=2C3496414FF9AE02A24580A8E9AC13C218816A5183B181295A18451255FD1F3082BC0D107D0A650BB2CBAB314F0A270509F31BECED94CF9ECFBB&v=2&t=0.4483148|Mozilla/4.0_(compatible;_MSIE_6.0.2900.2180;_Windows_NT_5.1.2600)|0x06____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|20______|16______|2427_____|2060_____| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |80___|6_______|20______|16______|2427_____|2060_____| **** ARGUS_DATA_Results **** ______________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP________|Dir|Flags|Sport|Dport|Pkts|Bytes| |10:32:04|2011-03-25|6_______|10.10.10.7|91.213.29.174|->_|e____|43___|80___|9___|1122_| |10:33:10|2011-03-25|6_______|10.10.10.7|91.213.29.174|->_|e____|578__|80___|9___|1122_| |10:34:19|2011-03-25|6_______|10.10.10.7|91.213.29.174|->_|e____|111__|80___|9___|1121_| |10:35:23|2011-03-25|6_______|10.10.10.7|91.213.29.174|->_|e____|770__|80___|9___|1122_| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|