**** Malware_Report_-_Results **** This report shows all the different areas TAZER analyzes for the sample: Host, Network Activity, and Detection. Malware Search Criteria: MD5 =d7a4e067e181c4fa121890193813c39b **** Malware_Report_-_Results **** _____________________________________________________________________________________________________________________________________________________________________________________________________________________________________ |File_MD5Sum_____________________|SHA1SUM_________________________________|SHA256SUM_______________________________________________________|FUZZY_HASH______________________________________________________________________|File_Size| |d7a4e067e181c4fa121890193813c39b|a2ea35cf95344bd24a48439fc36e80e91bd3adf9|bbd650ffda45dff5f2a995f0f5e46abe4617a63395d64a54d8a118273c39be4c|6144:e55pZEpG79xAToqSUUFknJ5kM+nrn1fk0Eo9jm6XJY6XQOpkImzxHvZeamVcl:apZEpG79x86yG|509440___| **** File_Results **** _________________ |File_Name________| |noticianeymar.exe| **** SNORT_Results **** ___________________________________________ |Snort_Class|Snort_Alert______________|Count| |N/A________|No_snort_alerts_generated|0____| **** AV_Results **** ______________________________________________ |AV_Alert____________________________|AV_Vendor| |N/A_________________________________|Symantec_| |N/A_________________________________|McAfee___| |HEUR:Trojan-Downloader.Win32.Generic|Kaspersky| |Infostealer_________________________|Symantec_| |PWS-Zbot.gen.ds_____________________|McAfee___| |Trojan-Spy.Win32.Zbot.bop___________|Kaspersky| **** Folders_(Added)_-_ICC_Results **** ________________ |Path|Folder_Name| **** Files_(Added)_-_ICC_Results **** ___________________________________________ |Path_______________|File_Name______________| |c:/WINDOWS/Prefetch|SANDNET.EXE-2012C478.pf| |c:/WINDOWS_________|Key_Atualizada_________| |c:_________________|netstat_post.txt_______| |c:_________________|taskv_post.txt_________| **** Files_(Deleted)_-_ICC_Results **** _____________________ |Action|Path|File_Name| **** Files_(Changed)_-_ICC_Results **** ________________________________________________________________________ |Action__|Path__________________________________|File_Name_______________| |modified|c:/Documents_and_Settings/dmc73144____|ntuser.dat.LOG__________| |modified|c:/WINDOWS/Prefetch___________________|CMD.EXE-087B4001.pf_____| |modified|c:/WINDOWS/Prefetch___________________|HSTART.EXE-221D72BF.pf__| |modified|c:/WINDOWS/Prefetch___________________|NETSTAT.EXE-2B2B4428.pf_| |modified|c:/WINDOWS/Prefetch___________________|SH.EXE-00254D2B.pf______| |modified|c:/WINDOWS/Prefetch___________________|SLEEP.EXE-094A3D2A.pf___| |modified|c:/WINDOWS/Prefetch___________________|SSHD.EXE-298CA236.pf____| |modified|c:/WINDOWS/Prefetch___________________|SWITCH.EXE-0496EC21.pf__| |modified|c:/WINDOWS/Prefetch___________________|TASKLIST.EXE-10D94B23.pf| |modified|c:/WINDOWS/system32/drivers/etc_______|hosts___________________| |modified|c:/WINDOWS/system32/wbem/Logs_________|wmiprov.log_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|INDEX.MAP_______________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING.VER_____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|MAPPING2.MAP____________| |modified|c:/WINDOWS/system32/wbem/Repository/FS|OBJECTS.MAP_____________| **** Registry_Keys_(Added)_-_ICC_Results **** ___________ |Action|Path| **** Registry_Values_(Added)_-_ICC_Results **** _____________________________ |Action|Path|Val_Name|Val_Data| **** Registry_Values_(Deleted)_-_ICC_Results **** ________________________________________________________________ |Action|Path|Val_Name|Val_Type|Mod_Val_Type|Val_Data|Mod_Val_Data| **** Registry_Values_(Changed)_-_ICC_Results **** ___________________________________________________________________________________________________________________________________________________________________________________________________________________________ |Action__|Path____________________________________|Val_Name|Val_Data________________________________________________________________________|Mod_Val_Data___________________________________________________________________| |modified|HKLM/SOFTWARE/Microsoft/Cryptography/RNG|Seed____|5F_C6_B5_0D_50_DF_FB_38_97_DC_2B_0B_BE_21_5B_15_D4_A3_78_A7_F0_D6_B6_4C_DF_5A_D1|C0_9D_CD_A9_F2_4A_16_C2_27_84_F1_DE_D9_A2_18_F3_8A_9D_1A_49_2C_A8_7F_B1_34_C3_D| **** DNS_Results **** ________________ |DNS|DNS_Response| **** URL_Results **** _____________________________________________________________________________________________________ |DstIP__________|HTTP_HOST___________|HTTP_REQUEST_URI|HTTP_USER_AGENT_______________________|PROTOCOL| |74.63.223.132__|74.63.223.132_______|/enviador.php___|Mozilla/3.0_(compatible;_Indy_Library)|0x06____| |74.63.223.132__|74.63.223.132_______|/hosts__________|Mozilla/3.0_(compatible;_Indy_Library)|0x06____| |239.255.255.250|239.255.255.250:1900|*_______________|--blank--_____________________________|0x11____| **** ARGUS_PROTOCOL_Results **** ______________________________________________ |PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |6_______|11______|9_______|1069_____|1090_____| |17______|1_______|0_______|175______|0________| **** ARGUS_DPORT_Results **** ____________________________________________________ |DPORT|PROTOCOL|SRC_PKTS|DST_PKTS|SRC_BYTES|DST_BYTES| |80___|6_______|11______|9_______|1069_____|1090_____| |1900_|17______|1_______|0_______|175______|0________| **** ARGUS_DATA_Results **** ________________________________________________________________________________________ |Time____|Date______|Protocol|SrcIP_____|DstIP__________|Dir|Flags|Sport|Dport|Pkts|Bytes| |13:37:06|2011-07-17|6_______|10.10.10.7|74.63.223.132__|->_|e____|451__|80___|11__|1203_| |13:37:07|2011-07-17|6_______|10.10.10.7|74.63.223.132__|->_|e____|43___|80___|9___|956__| |13:42:40|2011-07-17|17______|10.10.10.7|239.255.255.250|->_|e____|8____|1900_|1___|175__| **** Packer_Results **** ___________ |Packer_Name| **** HoneyTrap_Results **** ____________________________ |Honey_Trap_Log_File_Location| **** PTFB_Results **** ______________________ |PTFB_Log_File_Location|