Submission Summary:

What's been foundSeverity Level
Downloads/requests other files from Internet.
Installs a default debugger that is injected into the execution sequence of a target application. If a threat is installed as a default debugger, it will be run every time a target application is attempted to be launched - either to mimic it and hide its own presence (e.g. an open port or a running process), or simply to be activated as often as possible.

 

Technical Details:

 

File System Modifications

#Filename(s)File SizeFile Hash
1 %System%\dnsm.exe
[file and pathname of the sample #1]
195,072 bytes MD5: 0x8B991990F74287A2345CA9FDF7D80908
SHA-1: 0xA790C02D015AE3FE63D75BCC0B2953780F027E4D

 

Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]372,736 bytes

Process NameProcess FilenameAllocated Size
svchost.exe%System%\svchost.exe360,448 bytes
IEXPLORE.EXE%ProgramFiles%\internet explorer\iexplore.exe360,448 bytes

 

Registry Modifications

 

Other details

Russian Federation

Server NameServer PortConnect as UserConnection Password
biojewelry.net80(null)(null)
sommi.net80(null)(null)
kidslair.com80(null)(null)
hofokianer.myftp.org80(null)(null)
fumolura.mrbasic.com80(null)(null)
kiomerata.my03.com80(null)(null)

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.