Server : FederalBereauofInvestigation [1.2.1546]

Remote Host Port Number
72.184.197.176 6667

NICK XP|00|USA|SP2|7921
USER aqxt 0 0 :XP|00|USA|SP2|7921
USERHOST XP|00|USA|SP2|7921
MODE XP|00|USA|SP2|7921 +x+iB
JOIN #ecko
PONG :FederalBereauofInvestigation

Other details

* The following ports were open in the system:

Port Protocol Process
113 TCP msconfig.exe (%System%msconfig.exe)
1052 TCP msconfig.exe (%System%msconfig.exe)

Registry Modifications

* The following Registry Keys were created:
o [pathname with a string SHARE]MSConfig
o [pathname with a string SHARE]services
o [pathname with a string SHARE]startupfolder
o [pathname with a string SHARE]startupreg
o [pathname with a string SHARE]state
o HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices
o HKEY_CURRENT_USERSoftwareMicrosoftOLE

* The newly created Registry Values are:
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle]
+ EnableRemoteConnect = “N”
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
+ DRam prosessor = “msconfig.exe”

so that msconfig.exe runs every time Windows starts
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunServices]
+ DRam prosessor = “msconfig.exe”

so that msconfig.exe runs every time Windows starts
o [HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings]
+ MaxConnectionsPer1_0Server = 0x00000050
+ MaxConnectionsPerServer = 0x00000050
o [HKEY_CURRENT_USERSoftwareMicrosoftOLE]
+ DRam prosessor = “msconfig.exe”

* The following Registry Values were modified:
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftOle]
+ EnableDCOM =
o [HKEY_LOCAL_MACHINESYSTEMControlSet001ControlLsa]
+ restrictanonymous =
o [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsa]
+ restrictanonymous =

Memory Modifications

* There was a new process created in the system:

Process Name Process Filename Main Module Size
msconfig.exe %System%msconfig.exe 1 179 648 bytes

File System Modifications

* The following files were created in the system:

# Filename(s) File Size File Hash Alias
1 %Windir%psssystem.ini.backup 231 bytes MD5: 0xB143A6852C9EF93E0BDECB02F524F9F2
SHA-1: 0x83C15BD58DFF36C08DB093F81ECFD431C404A933 (not available)
2 %Windir%psswin.ini.backup 477 bytes MD5: 0x8715347D6B7B2E3A7CFE5ADF2D510CE3
SHA-1: 0x36C55AE9BD5F13E601A9C2FCB79B3237032D4AA7 (not available)
3 %System%msconfig.exe 261 632 bytes MD5: 0x26BF016FA1C4AE5B30CBE59928B1C740
SHA-1: 0x68388C00EEBDB69837B0CB6844BE8A663B8456E6 Net-Worm.Randex [PCTools]
W32.Randex.gen [Symantec]
Backdoor.Win32.Rbot.gen [Kaspersky Lab]
W32/Sdbot.worm.gen.g [McAfee]
WORM_RBOT.GEN-1 [Trend Micro]
W32/Rbot-Fam, W32/Rbot-Gen [Sophos]
Backdoor:Win32/Rbot.gen [Microsoft]
Win32/IRCBot.worm.Gen [AhnLab]
4 [file and pathname of the sample #1] 501 288 bytes MD5: 0x960C035EA8B60C13C012F0BFBB17914D
SHA-1: 0x696D106B16E2BDA9E17DE1AE8F826DB867B843C8 (not available)
5 %System%wbemPerformanceWmiApRpl_new.ini 2 bytes MD5: 0xC4103F122D27677C9DB144CAE1394A66
SHA-1: 0x1489F923C4DCA729178B3E3233458550D8DDDF29 (not available)

Categories: Uncategorized
Next post