* The following Host Name was requested from a host database:
o 192.5.5.241 and we are confronted with just another DNS root server abuse from a tcp dump in a casestudy...
Yes, see that:
F-Prot packer identifier
AutoIt, UTF-8, UPX
Default packer used by AutoIt is the free UPX,
but if you wanna more protection you need to use some commercial products like TheMida, Execryptor or ZProtect.
UTF-8 is an alternative to compressing, so using the ISO-8859-1/UTF-8 setting…
Remember, if you not use UPX, to disable UPX compression and after apply the chosen packer compression
Also 3 mutexes created:
CritOpMutex (created by the second)
MSCTF.Shared.MUTEX.IFG typical for e.g. Zeus tracker malware & win32 trojans
_SHuassist.mtx
Hi Pol,just found more time to look into it.Searching at a forum i found a confirmed Win32/Phorphiex sample
You can see it here https://www.virustotal.com/ru/file/edb1a99271f8c7b871829ec9b530e2715dc2a90685f30693730434f645a0ae18/analysis/ .
Again here,the behavioural analysis will save us.Not only this sample is packed by the very 3 same packers as uppa.exe but the created/opened ifles are the same.
The sample you provided(843921.exe):
C:\1705c491dd4ca9a8e0b82e7bd106bef10bbb08fdad752d0cb5a7bae74ea09c2b (successful)
\.\PIPE\lsarpc (successful)
\.\MountPointManager (successful)
C:\DOCUME~1<USER>~1\LOCALS~1\Temp\aut1.tmp (successful)
C:\DOCUME~1<USER>~1\LOCALS~1\Temp\noir.art (successful)
C:\WINDOWS\system32\rsaenh.dll (successful)
The sample i provided(IMG0540230-JPG.sc_):
C:\edb1a99271f8c7b871829ec9b530e2715dc2a90685f30693730434f645a0ae18 (successful)
\.\PIPE\lsarpc (successful)
\.\MountPointManager (successful)
C:\DOCUME~1<USER>~1\LOCALS~1\Temp\aut1.tmp (successful)
C:\DOCUME~1<USER>~1\LOCALS~1\Temp\noir.art (successful)
C:\WINDOWS\system32\rsaenh.dll (successful)
Is there any need to continue?You can check it on your own to find more similarities .
Regards,
Philip
Thanks for this instructional informative posts. It stands out in white lines on my “inner blackboard” and the lesson learnt will be applied with further investigations.
Thanks again for your positive and inspirational input,