system
522
polonus
523
Hi razoreqx,
Same category: http://www.virustotal.com/file-scan/report.html?id=e4e269d9ad00071607b85105055b223b781fc7ab0f0df70f79f084ae0d639304-1323464483
See this analysis, based on same MD5 hash: http://camas.comodo.com/cgi-bin/submit?file=e4e269d9ad00071607b85105055b223b781fc7ab0f0df70f79f084ae0d639304
This is how DrWeb’s URL scanner detected this malware:
Checking: -http://46.166.157.31/up_4.exe
Engine version: 5.0.2.3300
Total virus-finding records: 2910580
File size: 169.50 KB
File MD5: 0f38403648d34e9987abf501af245973
-http://46.166.157.31/up_4.exe packed by UPX
-http://46.166.157.31/up_4.exe infected with BackDoor.IRC.NgrBot.42
reported to virus AT avast dot com,
polonus
system
525
system
526
http://www.virustotal.com/file-scan/report.html?id=e0418aedec38ddd20ec322c736c1090f88de9522d00f49289c8cabb65e91d35d-1323691928
Rogue.FakeRean
Sample uploaded.
GET /SecureKit2011.exe HTTP/1.0
Accept: image/gif, image/jpeg, image/pjpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, application/x-ms-application, application/x-ms-xbap, application/vnd.ms-xpsdocument, application/xaml+xml, /
Referer: hxxp://ihbbdbungles.info/global-scan/
Accept-Language: en-us
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; WinTSI 08.01.2010; .NET4.0C; .NET4.0E)
Host: ihbbdbungles.info
Connection: keep-alive
Via: 1.1 OHAEPHQAS700
HTTP/1.1 200 OK
Server: nginx/1.0.5
Date: Sun, 11 Dec 2011 19:40:22 GMT
Content-Type: application/x-msdownload
Connection: keep-alive
Last-Modified: Sun, 11 Dec 2011 19:37:03 GMT
ETag: “4e6d9e-44e00-4b3d6247715c0”
Accept-Ranges: bytes
Content-Length: 282112
Pondus
527
system
528
polonus
529
polonus
531
polonus
532
system
533
polonus
534
polonus
535
polonus
536
polonus
537
polonus
538
polonus
540