From: "Mike Easter" <MikeE@ster.invalid>
> ~BD~ wrote:
>
>> hxxp://radiolunaser.com/order2/Order.zip?to_client:boab_doc@hotmail.co.uk
>
> The payload is Order.zip.
>
> This is the result of testing that file at VirusTotal
>
> http://www.virustotal.com/file-scan/...f4b-1305032477
>
> The contents are an Order.Doc file which has 5/43 positives
>
> ClamAV Suspect.DoubleExtension-zippwd-12
> Kaspersky Trojan-Spy.Win32.SpyEyes.hdy
> NOD32 a variant of Win32/Kryptik.NON
> Sophos Mal/BredoZp-B
> VIPRE FraudTool.Win32.AVSoft (v)
>
> If you were so inclined, you could carefully examine the .doc.
>
Please stop feeding the BD troll.
You are also wrong. The file is NOT a DOC file it is an EXE file.
Order.Doc_________________________________________ ______________________________.exe
Also in the future, please obfuscate malicious URLs and don't use shortened URLs via
Libya.
This malware copies itself to;
C:\Recycle.Bin\Recycle.Bin.exe
creates;
C:\Recycle.Bin\config.bin
It hooks into many running processes.
It communicates to; csgametome2.com via TCP port 444
as well as uploading encrypted data via; /~a?brvalg/g?ate.php
It creates a Mutex of; 2HiH8UlWBE0Me8DueMgM0VQKflf280p
--
Dave
Multi-AV Scanning Tool - http://www.pctipp.ch/downloads/dl/35905.asp


Reply With Quote