Submission Summary:

What's been foundSeverity Level
Creates a startup registry entry.
Uses the AppInit_DLLs value in order to install a module that will be loaded into the address space of every running application.
Packed with a packer that is known to be used by malware (e.g. to complicate threat analysis or detection).
Contains characteristics of an identified security risk.

 

Technical Details:

 

Possible Security Risk

Security RiskDescription
Adware.Component.Unrelated These common components have files and keys that are in different threats but the threats are not related to one another in that the author of the signature is not the same. It is recommended that all these entries be removed.

Threat CategoryDescription
A malicious backdoor trojan that runs in the background and allows remote access to the compromised system
A keylogger program that can capture all user keystrokes (including confidential details such username, password, credit card number, etc.)

 

File System Modifications

#Filename(s)File SizeFile HashAlias
1 %System%\drivers\HBKernel32.sys 14,640 bytes MD5: 0xC0ECC24C16F4D0C438931928AED4C483
SHA-1: 0x61346247B5CB81F025693EBBC96144F9EC193ABB
Infostealer.Gampass [Symantec]
Backdoor.Win32.Agent.rnq [Kaspersky Lab]
TSPY_SYSTEMHI.CL [Trend Micro]
PWS:Win32/Lolyda.K [Microsoft]
2 %System%\HBSOUL.dll 24,576 bytes MD5: 0x5A60F615A54AEFF4C6E71A6ED2FB942E
SHA-1: 0x7A7CCCEE2D3B5D026BBDC47972C9FBECECB8F130
Infostealer.Gampass [Symantec]
3 [file and pathname of the sample #1] 16,701 bytes MD5: 0x3138BED1A36A88E60CFBFD196785409E
SHA-1: 0xC473C81AF8C62BF4B843085C47BC1123528A1EA6
Infostealer.Gampass [Symantec]
Trojan-GameThief.Win32.OnLineGames.thlh [Kaspersky Lab]
New Malware.aj [McAfee]
4 %System%\System.exe 5,120 bytes MD5: 0x2FC7CE087FC7C8847C1DE12BA5CA14D8
SHA-1: 0x6C675C9D595B3C8009ECD0301D3827709E4CBBF0
Infostealer.Gampass [Symantec]

 

Memory Modifications

Process NameProcess FilenameMain Module Size
System.exe%System%\system.exe16,384 bytes
[filename of the sample #1][file and pathname of the sample #1]118,784 bytes

Module NameModule FilenameAddress Space Details
HBSOUL.dll%System%\HBSOUL.dllProcess name: System.exe
Process filename: %System%\system.exe
Address space: 0x830000 - 0x836000
HBSOUL.dll%System%\HBSOUL.dllProcess name: IEXPLORE.EXE
Process filename: %ProgramFiles%\internet explorer\iexplore.exe
Address space: 0x10000000 - 0x10006000

Driver NameDriver Filename
HBKernel32 Driver%System%\Drivers\HBKernel32.sys

 

Registry Modifications

 

Other details

China

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.