Submission Summary:

 

Technical Details:

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %Temp%\64F4EA4C8142CAC73E06647D59A699D1.dll 4,096 bytes MD5: 0x14DD1F05C6BD3CE4ACAB3EBDB9F0903B
SHA-1: 0x2DBDEBF59A5BF398CB73D930E9F9796A888E93E8
(not available)
2 %Temp%\bassmod.dll 9,728 bytes MD5: 0x780D14604D49E3C634200C523DEF8351
SHA-1: 0xE208EF6F421D2260070A9222F1F918F1DE0A8EEB
(not available)
3 %Temp%\C5E3399ED9A072FE864748D49BA96094.dll 2,560 bytes MD5: 0x13249BC6AA781475CDE4A1C90F95EFD4
SHA-1: 0x0D8698BEFD283CA69D87CE44DAD225EF792B06DA
(not available)
4 %Temp%\dup2patcher.dll 379,904 bytes MD5: 0xDB28F56350BEF1A16C54AF1BF2A70B6D
SHA-1: 0x2A6EA608A5B7419708ED0DA7F9795D5CA57D5029
packed with UPX [Kaspersky Lab]
5 %Temp%\Visitor -BRK-.FON 3,520 bytes MD5: 0x91C8190CC9ADDCE1C97D99A5DD1EB58D
SHA-1: 0xAF7BFD1BC7E40EB1E5EE9F6F47475E4BA6F1884D
(not available)
6 [file and pathname of the sample #1] 388,608 bytes MD5: 0xA9D2FEBCF7D7A5C6E94EB0CC8086C999
SHA-1: 0xC5FE0B38314BB75AA05EA84BBA83C30E75CFBF28
not-a-virus:RiskTool.Win32.Patcher.dk [Kaspersky Lab]
Troj/Agent-WFN [Sophos]
Trojan.Win32.Spy [Ikarus]

 

Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]409,600 bytes

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2017 ThreatExpert. All rights reserved.