Submission Summary:

 

Technical Details:

 

File System Modifications

#Filename(s)File SizeFile Hash
1 %Temp%\b5n3.class 1,250 bytes MD5: 0x83BAF6AFDC61120295B7BD1FC1156633
SHA-1: 0x6E7C631489C180B326F782732BBB7E136C555163
2 %Temp%\g5z6.class 1,923 bytes MD5: 0xB48E9DD9977769DC59FA9AFAB65FA921
SHA-1: 0xFEE13CD4EF4BFF4D3C53A8626A71044FE1878C0E
3 %Temp%\g6k1.class 4,053 bytes MD5: 0x92CC4858B15F62968FD9435C97E9C1C6
SHA-1: 0x6A81D05E009D83D206F5BB76AB67F1E1B9FF8619
4 %Temp%\h6l4.class 16,375 bytes MD5: 0x76A8808FD01014A6B3D709029B317895
SHA-1: 0xAF48381BFE7812E58758BAD7F65A26184FE03CD7
5 %Temp%\main.class 10,754 bytes MD5: 0x7AF514EC7F3FD5ECBC9B6C677259E54E
SHA-1: 0x86BBF0D013914953EF8BBC3CD1D361B6B022BFD2
6 %Temp%\META-INF\MANIFEST.MF 43 bytes MD5: 0xAEC2581F7B8DF736F8468D2CBBBF57D7
SHA-1: 0xBCFEAF4D34359294B628CB9C1CC740C044D244CA
7 %Temp%\q3p0.class 2,830 bytes MD5: 0x93784F44FC06DA6066ECAADEC7C27475
SHA-1: 0x223924E1892FC18B367148F8ED7DCB9796F81660
8 %Temp%\Tuvvoaerffb.class 6,763 bytes MD5: 0x8A48137EDCF4A55B27E1AC5EF6DF5658
SHA-1: 0xB89D4061AFEF96DBCA1A08560725100113E9FDD5
9 %Temp%\y6u7.class 14,429 bytes MD5: 0x732D9A0713839C5089F3BDC2AA71FB08
SHA-1: 0xDC6AAA51F15547E2E1E502BCC4CDAC72FDD9DD37
10 [file and pathname of the sample #1] 35,071 bytes MD5: 0x3092E0784A0466DEEAB807691D72B488
SHA-1: 0xC97BD49071AA7A1117844FDC59B762AD2BD8E4DD

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.