User-69-ex- What is this unknown executable - malware?

Hi folks,

See: http://www.virustotal.com/url-scan/report.html?id=544742aaf35169682cc442629c56e7e4-1321303210
See: http://www.virustotal.com/file-scan/report.html?id=6514c0ce94113d2179176e23954919b21340e3a42a8b3a43b473303f3b770744-1321307062
Taken 2011-11-14 MD5 hash = 13ef1501ca2901b45a26ec656930a6b0
Here the file is being detected by Norman as W32/Krypt.AJ and as Win32/Vundo.F!generic by eTrust-Vet and F-Prot finds it as W32/Lampa.A2.gen!Eldorado, see: http://vscan.urlvoid.com/analysis/13ef1501ca2901b45a26ec656930a6b0/dXNlci02OS1leGU=/
Not detected here: http://wepawet.iseclab.org/view.php?hash=544742aaf35169682cc442629c56e7e4&t=1321307663&type=js
Here we can see it is a generic find: http://www.garyshood.com/virus/results.php?r=13ef1501ca2901b45a26ec656930a6b0
Given suspicious here: http://siteinspector.comodo.com/public/reports/626364
Virusname: virusname=Agent_r.ASK
Another example with another MD5 hash from the same site where it resides taken on 2011-11-13
http://www.threatexpert.com/report.aspx?md5=b840fdf31b4ee2be22050f75c8468727
http://www.virustotal.com/file-scan/report.html?
id=0f2730a3cb1a73d35799558b247e62116a1638482f398bba00494c94ec566da1-1321265005
http://camas.comodo.com/cgi-bin/submit?file=0f2730a3cb1a73d35799558b247e62116a1638482f398bba00494c94ec566da1

polonus

did you send it ?..if not i have :wink:

Hello … is likely to modify Trojan.Mayachok.

http://vms.drweb.com/virus/?i=730822&lng=en

http://xylibox.blogspot.com/2011/11/tracking-cyber-crime-malwox-win32cidox.html

http://news.drweb.com/?i=1869&c=5&lng=en&p=4

DrWeb Lab :

Your request has been analyzed. The corresponding entry is added to Dr.Web virus database and will be available in the next update.

Threat: Trojan.Mayachok.1

File: user_69.exe
MD5: 13ef1501ca2901b45a26ec656930a6b0

@Pondus,

Thanks for forwarding it to avast,

@Dim@rik,

Thanks, virus-hunter, for the follow-up at DrWeb’s virus labs,

polonus

VirusTotal - user_69.exe
http://www.virustotal.com/file-scan/report.html?id=c43c2d6fb8f59ccce3dc4482713d701126f5fc21b12fa722d86dc52b57468798-1321368611

still not detected…and one strange thing…it now have a different MD5
will check with Avira and Sophos also and post result

Is it a False Positive ???

First seen: 2011-11-15 14:50:11
Last seen : 2011-11-15 14:50:11

sigcheck:
publisher…: Microsoft Corporation
copyright…: (c) Microsoft Corporation. All rights reserved.
product…: Microsoft_ Windows_ Operating System
description…: MSCANDUI Server
original name: MSCANDUI.EXE
internal name: MSCANDUI
file version.: 5.1.2600.5512 (xpsp.080413-2105)
comments…: n/a
signers…: -
signing date.: -
verified…: Unsigned

yes ??? the size of the same … but different MD5.

Norman has good heuristics. 8)

http://online.us.drweb.com/cache/?i=a0a63dcafae5aab0549fe3d653427ebd
http://online.us.drweb.com/cache/?i=80f2ce3cdb01d9e08c79f06b91eef894

Hi Pondus,

Compare these search queries: http://www.virustotal.com/file-scan/report.html?id=e2eea028320943556b5d7d3f8d8f226112e7a4cebea63dadd6bfe7ec3a915269-1321369614
with this VT result: http://www.virustotal.com/file-scan/report.html?id=6514c0ce94113d2179176e23954919b21340e3a42a8b3a43b473303f3b770744-1321365175
Updated the filename changes to: smona132136508154622894683
with MD5 hash: 13ef1501ca2901b45a26ec656930a6b0

polonus

Have also submited a false positive case at Norman analysis desktop…so we will see what they say

Malwarebytes detect it as Trojan.Agent and FP at MBAM is rare

I wouldn’t say FP at MBAM is rare, infrequent yes, rare no.

All of the detections I have had on MBAM have been FPs not that I expect to get any detections in the first place. I switched off the malicious IP feature very shortly after getting the MBAM Pro version, for me more pain than gain ;D

@DavidR… do you mean FP on file scan…or FP on IP block ?

ThreatExpert report on file above
http://www.threatexpert.com/report.aspx?md5=d8acd0f20eeeb5af0d7460860c8bc5d4

Incomming…Sophos is quick as usuall, only 40min ;D

he file(s) submitted were malicious in nature and detection will be available on the Sophos Databank shortly.

user_69.exe – identity created/updated ( New detection Troj/Agent-UAZ )

and from ThreatExpert report it seems Sophos was already sniffing on this as one of the .dll created ( %System%\vfpdxnd.dll ) was already detected as Troj/Virtum-Gen

Both.

The IP block is particularly bad as it is essentially touted as malicious website blocking and it is nothing of the sort. Its blocking is many more categories than malicious sites, so for me those other sites are essentially FPs.

Not to mention we have the network shield attending to true malicious sites (and of course the web shield), I honestly believe I’m better off without it.

Remember my reply was based on your comment that FPs are ‘rare’ in MBAM and believe that to be incorrect.

Well thanks for the reactions in this threat, Pondus, Dim@rik, DavidR. As the IP mentioned is known to infect with VUNDO, Virus.Win32.Vundo, TR/Vundo.odalz, Backdoor/Win32.Agent and Dropper/Win32.Cidox etc *. I thought to run the malware URL through Anubis to get to binairies there analyzed as Anubis has become available again after a short “overhaul”.

The results can be found here: http://anubis.iseclab.org/?action=result&task_id=15d784f8a97d135c449e303d5d8be4209

Just walking the analysis, I found:
Unexpected exeptions in the native code. Heap corruption here: VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.1433_x-ww_5cf844d2\​MSVCR80.dll

Malicious spam spoofing code found at this attack code: S-1-5-21-842925246-1425521274-308236825-500\​Software\​Microsoft\​windows\​C

Pop-Dealio trojan like code detected through {1E66F26B-79EE-11D2-8710-00C04F79ED0D}\​INPROCSERVER32

Mapping attack code, created, re: Content.IE5\WDUF49AN\user_69[1].exe

(28.2%) detects the malware as Agent_r.ASK for IP 94.102.49.66 (is a site mainly launching VUNDO etc. as mentioned earlier in this posting *)

Also see: http://www.threatexpert.com/report.aspx?md5=b840fdf31b4ee2be22050f75c8468727

Mutex used in trojans: _SHuassist.mtx

polonus

Norman lab

Falsepos case on file user_69.exe (d8acd0f20eeeb5af0d7460860c8bc5d4) has been processed. No FP found!

Avira lab

The file 'user_69.exe' has been determined to be 'MALWARE'.Our analysts named the threat TR/Offend.KD.409679.The term "TR/" denotes a trojan horse that is able to spy out data, to violate your privacy or carry out unwanted modifications to the system.Detection is added to our virus definition file (VDF) starting with version 7.11.17.177.

Hi Pondus,

And another one from there, not detected by avast: http://www.virustotal.com/url-scan/report.html?id=2f61cd32957340be2229b1ab6e68e0c6-1321389075
VT file analysis: http://www.virustotal.com/file-scan/report.html?id=a5d656a239a48dc54358aaedf280e14af55784a33ec7647a2f05a6f3564c94b3-1321392682
This is Virus.Win32.Vundo - http://camas.comodo.com/cgi-bin/submit?file=8f8b36e43f8aacd677de08021b63411d91c48fc44fffedf41f69bf3936195eb8
Anubis comes up with this analysis: http://anubis.iseclab.org/?action=result&task_id=185665628a9d3add4d12eed8710fa5604
Reported to virus AT vast dot com,

polonus

Yesterday that would send … now defined.