Submission Summary:

What's been foundSeverity Level
Downloads/requests other files from Internet.
Creates a startup registry entry.

 

Technical Details:

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %AppData%\mkzskx.exe
%Temp%\upd1.tmp
156,833 bytes MD5: 0x005D5BEFAE4156BE55BD199CC626B101
SHA-1: 0x9015BA76756DE7743C3DDB83F7B659104C595B24
packed with PEBundle [Kaspersky Lab]
2 c:\fuckshit\BEB7E3EADAE.exe 262,817 bytes MD5: 0xB309A51F386110D7FCBEAF8F347D7C87
SHA-1: 0xA5F268A94D09A3E682AB043ABC8DDEC1A4F242D1
packed with PEBundle [Kaspersky Lab]
3 c:\fuckshit\CE6E266EF179A72 77,081 bytes MD5: 0xC7C48CA52F228D5B41E900BB04FF78C1
SHA-1: 0x6AA680F818A6237755D399944E167308B6BEBA63
(not available)
4 c:\iluminated.exe\config.bin 588 bytes MD5: 0x9D8C19AC5DBDEF89C4BC8795F42C87D4
SHA-1: 0x7C999CD3002EBE7037203B3DA695F9834A423FAC
(not available)
5 c:\iluminated.exe\iluminated.exe
[file and pathname of the sample #1]
333,283 bytes MD5: 0x7A126ED555C8717F7695B6D65DEE90E6
SHA-1: 0xF0332A37604E4DF20616B94C4FAE7A17312AAB61
Trojan.Trash [Ikarus]
packed with PEBundle [Kaspersky Lab]

 

Memory Modifications

Process NameProcess FilenameAllocated Size
lsass.exe%System%\lsass.exe20,480 bytes
lsass.exe%System%\lsass.exe319,488 bytes
lsass.exe%System%\lsass.exe286,720 bytes
svchost.exe%System%\svchost.exe319,488 bytes
svchost.exe%System%\svchost.exe286,720 bytes
svchost.exe%System%\svchost.exe319,488 bytes
svchost.exe%System%\svchost.exe286,720 bytes
svchost.exe%System%\svchost.exe319,488 bytes
svchost.exe%System%\svchost.exe286,720 bytes
svchost.exe%System%\svchost.exe20,480 bytes
svchost.exe%System%\svchost.exe319,488 bytes
svchost.exe%System%\svchost.exe286,720 bytes
svchost.exe%System%\svchost.exe319,488 bytes
svchost.exe%System%\svchost.exe286,720 bytes
alg.exe%System%\alg.exe319,488 bytes
alg.exe%System%\alg.exe286,720 bytes

 

Registry Modifications

 

Other details

Spain

Remote HostPort Number
91.211.117.4080

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.