Malware Report - Results

This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection.

Malware Search Criteria:
  • MD5 =d2cb1b454942f7e8235dfd24138b29c3

  • Malware Report - Results

    File MD5SumSHA1SUMSHA256SUMFUZZY HASHFile Size
    d2cb1b454942f7e8235dfd24138b29c3231a601a5abc1ecddf7d68546afe20db8f392c46e2181f80e1fcc21c82a9dc46265af3ceed37ee39769ca3d6ccd0f042f9265ac112288:iBLSpDHVXFsrsnd8dUQWeew+tPl2OBMwlU:iBLSpRXHmdUQBgPdMiU443920

    File Results

    File Name
    ic1.exe

    SNORT Results

    Snort ClassSnort AlertCount
    Misc AttackET RBN Known Russian Business Network IP TCP (86)1
    Misc AttackET RBN Known Russian Business Network IP TCP (59)1
    Misc AttackET RBN Known Russian Business Network IP TCP (382)1
    Misc AttackET RBN Known Russian Business Network IP TCP (338)1

    AV Results

    AV AlertAV Vendor

    Folders (Added) - ICC Results

    PathFolder Name
    c:/Documents and Settings/dmc73144/Local Settings/Tempnsd3.tmp
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE587IMY4XV
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5ITB2CJ0C
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5MILJGV5B
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5WO4JPI86

    Files (Added) - ICC Results

    PathFile Name
    c:/Documents and Settings/dmc73144/Application Data5xovzu4.log
    c:/Documents and Settings/dmc73144/Application Datab16pc7z.exe
    c:/Documents and Settings/dmc73144/Application DataMouseDriver.bat
    c:/Documents and Settings/dmc73144/Local Settings/Temp6.tmp
    c:/Documents and Settings/dmc73144/Local Settings/Temp/nsd3.tmp6tbp.exe
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/87IMY4XVdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/87IMY4XVgggklycc[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Cdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Ciwwnnrvi[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/ITB2CJ0Coyppct[1].htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/MILJGV5BCA4TMVWD.htm
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/MILJGV5Bdesktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/WO4JPI86desktop.ini
    c:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5/WO4JPI86obcptx[1].htm
    c:/WINDOWS/Prefetch1EUROP.EXE-0AA3609C.pf
    c:/WINDOWS/Prefetch2IC.EXE-32588CB3.pf
    c:/WINDOWS/Prefetch3E4U - BUCKS.EXE-169D9FCB.pf
    c:/WINDOWS/Prefetch6TBP.EXE-193C301C.pf
    c:/WINDOWS/PrefetchB16PC7Z.EXE-27B53645.pf
    c:/WINDOWS/PrefetchGRPCONV.EXE-111CD845.pf
    c:/WINDOWS/PrefetchIC1.EXE-01EC530D.pf
    c:/WINDOWS/PrefetchIR.EXE-076F025E.pf
    c:/WINDOWS/PrefetchNET.EXE-01A53C2F.pf
    c:/WINDOWS/PrefetchNET1.EXE-029B9DB4.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-2433F676.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-253557CF.pf
    c:/WINDOWS/PrefetchRUNDLL32.EXE-2DFF7D29.pf
    c:/WINDOWS/PrefetchRUNONCE.EXE-2803F297.pf
    c:/WINDOWS/PrefetchSANDNET.EXE-2012C478.pf
    c:/WINDOWS/PrefetchSC.EXE-012262AF.pf
    c:/WINDOWS/PrefetchSVCHOST.EXE-3530F672.pf
    c:/WINDOWSovupitite.dll
    c:/WINDOWSwscod32.dll
    c:netstat_post.txt
    c:tasksvc_post.txt
    c:taskv_post.txt

    Files (Deleted) - ICC Results

    ActionPathFile Name

    Files (Changed) - ICC Results

    ActionPathFile Name
    modifiedc:/Documents and Settings/dmc73144/Cookiesindex.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/History/History.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144/Local Settings/Temporary Internet Files/Content.IE5index.dat
    modifiedc:/Documents and Settings/dmc73144ntuser.dat.LOG
    modifiedc:/Documents and Settings/LocalServicentuser.dat.LOG
    modifiedc:/Program Files/OpenSSH/var/logOpenSSHd.log
    modifiedc:/WINDOWS/PrefetchHSTART.EXE-221D72BF.pf
    modifiedc:/WINDOWS/PrefetchNETSTAT.EXE-2B2B4428.pf
    modifiedc:/WINDOWS/PrefetchSLEEP.EXE-094A3D2A.pf
    modifiedc:/WINDOWS/PrefetchSSHD.EXE-298CA236.pf
    modifiedc:/WINDOWS/PrefetchSWITCH.EXE-0496EC21.pf
    modifiedc:/WINDOWS/PrefetchTASKLIST.EXE-10D94B23.pf
    modifiedc:/WINDOWS/system32/configdefault.LOG
    modifiedc:/WINDOWS/system32/configsoftware.LOG
    modifiedc:/WINDOWS/system32/configSYSTEM
    modifiedc:/WINDOWS/system32/configsystem.LOG
    modifiedc:/WINDOWS/system32/drivers/etchosts
    modifiedc:/WINDOWS/system32/wbem/Logswbemess.log
    modifiedc:/WINDOWS/system32/wbem/Logswmiprov.log

    Registry Keys (Added) - ICC Results

    ActionPath

    Registry Values (Added) - ICC Results

    ActionPathVal_NameVal_Data

    Registry Values (Deleted) - ICC Results

    ActionPathVal_NameVal_TypeMod_Val_TypeVal_DataMod_Val_Data

    Registry Values (Changed) - ICC Results

    ActionPathVal_NameVal_DataMod_Val_Data
    modifiedHKLM/SOFTWARE/Microsoft/Cryptography/RNGSeed8A BA A0 04 03 19 40 50 8C 6A A9 E0 DE 2B F6 51 BF 40 A6 8C 00 92 C1 A8 EA E0 CC 59 0F B9 9D 38 A5 7B 80 FD 83 D0 B2 3D A9 C9 4F BD 1D CA 12 D8 EF C3 A0 2F C3 3
    modifiedHKLM/SOFTWARE/Microsoft/DirectDraw/MostRecentApplicationName"msoobe.exe" "svchost.exe"
    modifiedHKLM/SOFTWARE/Microsoft/DirectDraw/MostRecentApplicationID0x3B7D853E 0x41107ED6
    modifiedHKLM/SOFTWARE/Microsoft/Windows NT/CurrentVersion/ProfileList/S-1-5-19RefCount0x00000002 0x00000001
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/ControlSet001/Services/SharedAccess/EpochEpoch0x00000106 0x00000107
    modifiedHKLM/SYSTEM/ControlSet001/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccessStart0x00000002 0x00000004
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/SharedAccess/EpochEpoch0x00000106 0x00000107
    modifiedHKLM/SYSTEM/CurrentControlSet/Services/wscsvcStart0x00000002 0x00000004
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/3CurrentLevel0x00011000 0x00000000
    modifiedHKU/.DEFAULT/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/316010x00000001 0x00000000
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/Software/Microsoft/Windows/CurrentVersion/Internet Settings/ConnectionsSavedLegacySettings3C 00 00 00 15 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 3C 00 00 00 19 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 0
    modifiedHKU/S-1-5-21-1844237615-562591055-839522115-1004/SessionInformationProgramCount0x00000002 0x00000001
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/3CurrentLevel0x00011000 0x00000000
    modifiedHKU/S-1-5-18/Software/Microsoft/Windows/CurrentVersion/Internet Settings/Zones/316010x00000001 0x00000000

    DNS Results

    DNSDNS Response
    tinypic.comStandard query response A 209.17.70.143
    match.comStandard query response A 208.83.243.15
    daum.netStandard query response A 114.108.157.50 A 61.111.62.173 A 110.45.215.23 A 114.108.157.19
    mastrubas.inStandard query response A 87.255.51.229
    caperiod.comStandard query response A 195.2.240.78
    myavava.inStandard query response A 87.255.51.229
    w.nucleardiscover.comStandard query response A 60.190.223.75
    clashjamwallop.inStandard query response A 64.158.56.57 A 63.251.179.57
    051207db0614.wordxs.netStandard query response A 202.150.208.66
    cr0wd-wal1.comStandard query response A 188.95.52.161 A 91.213.29.63

    URL Results

    DstIPHTTP_HOSTHTTP_REQUEST_URIHTTP_USER_AGENTPROTOCOL
    87.255.51.229mastrubas.in/90ds8c9ds8c9d0s8cds.php?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHrzfI2RtufQpKX/NPtqve7ukA==Mozilla/6.0 (Windows; wget 3.0)0x06
    195.2.240.78caperiod.com/pxxko/iwwnnrvi.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver750x06
    195.2.240.78caperiod.com/pxxko/oyppct.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver750x06
    195.2.240.78caperiod.com/pxxko/obcptx.php?adv=adv401&id=82799957&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver750x06
    195.2.240.78caperiod.com/pxxko/gggklycc.php?adv=adv401&code1=IRI0&code2=0502&id=82799957&p=1&b=1&c=10331881Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)ver750x06
    87.255.51.229myavava.in/90ds8c9ds8c9d0s8cds.php?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHrzfI2RtufQpKX/NPtqve7ukA==Mozilla/6.0 (Windows; wget 3.0)0x06
    64.158.56.57clashjamwallop.in/90ds8c9ds8c9d0s8cds.php?ini=v22MmjDnH4OmXzNmvVFHEeE2PuPsctM6PdFWTH11KB0CWwXTiUHUzGr1BVrHIQqMgMqV7ZlDeAiBMF4cAHrzfI2RtufQpKX/NPtqve7ukA==Mozilla/6.0 (Windows; wget 3.0)0x06
    95.143.193.13895.143.193.138/xxxx_5/bGcyMDAwfG5vbmFtZXwzMDAxOHwxfDAuMDN8MC4xNzV8NS4xIDI2MDAgU1AyLjB8b3RsODg4fF9DbWRFeGVjU2VydmVyc3xzdGFydA==0x06
    95.143.193.13895.143.193.138/xxxx_5/bGcyMDAwfG5vbmFtZXwzMDAxOHwxfDAuMDN8MC4xNzV8NS4xIDI2MDAgU1AyLjB8b3RsODg4fENtZEV4ZWNNYWlufGZhaWxlZHxodHRwczovL2NyMHdkLXdhbDEuY29tLw==0x06
    239.255.255.250239.255.255.250:1900*--blank--0x11

    ARGUS PROTOCOL Results

    PROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    61471321317518051
    17101750

    ARGUS DPORT Results

    DPORTPROTOCOLSRC_PKTSDST_PKTSSRC_BYTESDST_BYTES
    8068070801514321
    4436222014351204
    8886454237252526
    190017101750

    ARGUS DATA Results

    TimeDateProtocolSrcIPDstIPDirFlagsSportDportPktsBytes
    01:19:592011-06-12610.10.10.787.255.51.229-> e 45180132401
    01:20:012011-06-12610.10.10.7195.2.240.78-> e 412809973
    01:20:022011-06-12610.10.10.7195.2.240.78-> e 43809973
    01:20:032011-06-12610.10.10.7195.2.240.78-> e 568091005
    01:20:042011-06-12610.10.10.787.255.51.229-> e 45180101965
    01:20:092011-06-12610.10.10.787.255.51.229-> e 451806633
    01:20:112011-06-12610.10.10.787.255.51.229-> e 4480132399
    01:20:162011-06-12610.10.10.787.255.51.229-> e 4480101965
    01:20:172011-06-12610.10.10.760.190.223.75-> e 108888141184
    01:20:212011-06-12610.10.10.787.255.51.229-> e 44806633
    01:20:222011-06-12610.10.10.764.158.56.57-> e 8980132406
    01:20:232011-06-12610.10.10.760.190.223.75-> e 10888811660
    01:20:272011-06-12610.10.10.764.158.56.57-> e 8980112298
    01:20:282011-06-12610.10.10.760.190.223.75-> e 1088884240
    01:20:322011-06-12610.10.10.764.158.56.57-> e 89805300
    01:20:332011-06-12610.10.10.7202.150.208.66-> e 918091408
    01:21:302011-06-12610.10.10.760.190.223.75-> e 468888131124
    01:21:352011-06-12610.10.10.760.190.223.75-> e 46888811660
    01:21:402011-06-12610.10.10.760.190.223.75-> e 4688885300
    01:22:432011-06-12610.10.10.760.190.223.75-> e 258888131123
    01:22:482011-06-12610.10.10.760.190.223.75-> e 25888811660
    01:22:532011-06-12610.10.10.760.190.223.75-> e 2588885300
    01:23:172011-06-12610.10.10.7188.95.52.161-> e 14444313856
    01:23:172011-06-12610.10.10.795.143.193.138-> e 355809987
    01:23:222011-06-12610.10.10.7188.95.52.161-> e 14444310600
    01:23:272011-06-12610.10.10.7188.95.52.161-> e 1444436360
    01:23:282011-06-12610.10.10.7188.95.52.161-> e 65044313823
    01:23:312011-06-12610.10.10.795.143.193.138-> e 6518091015
    01:25:262011-06-121710.10.10.7239.255.255.250-> e 819001175

    Packer Results

    Packer Name

    HoneyTrap Results

    Honey Trap Log File Location

    PTFB Results

    PTFB Log File Location