Remote Host Port Number 51987

MODE pLagUe{USA}91936 -ix
New PC Infected.

* The following port was open in the system:

Port Protocol Process
1052 TCP raidhost.exe (%Windir%raidhost.exe)

Registry Modifications

* The newly created Registry Value is:
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
+ raidhost = “raidhost.exe”

so that raidhost.exe runs every time Windows starts

Memory Modifications

* There was a new process created in the system:

Process Name Process Filename Main Module Size
raidhost.exe %Windir%raidhost.exe 356 352 bytes

File System Modifications

* The following files were created in the system:

# Filename(s) File Size File Hash Alias
1 %Windir%raidhost.exe
[file and pathname of the sample #1] 106 496 bytes MD5: 0x4CD2EE467C392D48581372387C7BD205
SHA-1: 0xADCD9AD5BC992F5E2617B97950A944A2120465E6 [Kaspersky Lab]
2 %System%YoItzVlad.tmp 5 bytes MD5: 0xD356C81C0BDF1FE2059EABDA720CA0D4
SHA-1: 0x6A09BBFD26586342F7A9F19B82EBBE5AAB023E06 (not available)

Categories: Uncategorized
Previous post
Next post