67.43.232.36

Remote Host Port Number
204.0.5.51 80
208.53.183.20 80
208.53.183.46 80
67.210.170.179 80
205.188.59.194 25
64.12.90.98 25
67.43.232.36 5190

* The data identified by the following URLs was then requested from the remote web server:
o http://http.icq.com.edgesuite.net/pub/ICQ_Win95_98_NT4/ICQ_4/Lite_Edition/icq4_setup.exe
o http://yutunrz.1dumb.com/reg?u=7710BA55&v=187&s=0&su=0&p=1&e=0&o=0&a=0&wr=75

JOIN #kok7
USERHOST FQixZtkC
MODE ##xddc +smntu
MODE #xddc1 +smntu
MODE #xddc2 +smntu
MODE #kok7 +smntu
USER sxanro sxanro sxanro :kyxiqeezkkdoxrdj
NICK FQixZtkC
MODE FQixZtkC +xi

Other details

* The following ports were open in the system:

Port Protocol Process
1060 TCP spoolsvc.exe (%System%spoolsvc.exe)
1114 TCP spoolsvc.exe (%System%spoolsvc.exe)
37286 TCP spoolsvc.exe (%System%spoolsvc.exe)

Registry Modifications

* The newly created Registry Value is:
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
+ qozx = “%System%ikjwcqijcmewox.exe”
+ Spooler SubSystem App = “%System%spoolsvc.exe”

so that ikjwcqijcmewox.exe runs every time Windows starts
so that spoolsvc.exe runs every time Windows starts

* The following Registry Value was modified:
o [HKEY_LOCAL_MACHINESOFTWAREMicrosoftSecurity Center]
+ AntiVirusOverride =
+ FirewallOverride =

Memory Modifications

* There were new processes created in the system:

Process Name Process Filename Main Module Size
spoolsvc.exe %System%spoolsvc.exe 311 296 bytes
ikjwcqijcmewox.exe %System%ikjwcqijcmewox.exe 73 728 bytes

File System Modifications

* The following files were created in the system:

# Filename(s) File Size File Hash Alias
1 %System%apfgu.exe 43 008 bytes MD5: 0x0F48EE11F8AD24456B28C36328990D29
SHA-1: 0xB6F0ACF24BD786D6980C7B51B4467AB4AB05FAD2 Trojan.Gen [PCTools]
Trojan.Gen [Symantec]
P2P-Worm.Win32.Palevo.rmm [Kaspersky Lab]
Generic.dx!noa [McAfee]
Troj/DelfInj-E [Sophos]
VirTool:Win32/DelfInject.gen!BH [Microsoft]
Win32/Palevo.worm.52736.E [AhnLab]
2 %System%eltn.exe 33 280 bytes MD5: 0x62F81A1FAE4AA2ECD47F326B5D18D2E1
SHA-1: 0x81CC7F780B41DD785685402E12FAE5EC32B661D6 Backdoor.Trojan [PCTools]
Backdoor.Trojan [Symantec]
Email-Flooder.Win32.Agent.r [Kaspersky Lab]
Generic Flooder!a [McAfee]
Mal/Generic-A [Sophos]
VirTool:Win32/DelfInject.gen!BH [Microsoft]
Win32/Palevo.worm.33280.D [AhnLab]
3 %System%ifdgzku.exe 43 008 bytes MD5: 0x1024BC6D735206A85209341A54672AFB
SHA-1: 0xE3CC24CFD3368790BB001990E67123BEEA7E866C Backdoor.Trojan [PCTools]
Backdoor.Trojan [Symantec]
P2P-Worm.Win32.Palevo.rmm [Kaspersky Lab]
Generic.dx!nns [McAfee]
Troj/DelfInj-E [Sophos]
VirTool:Win32/DelfInject.gen!BH [Microsoft]
Win32/Palevo.worm.52736.E [AhnLab]
4 %System%ikjwcqijcmewox.exe 43 520 bytes MD5: 0x98A09933FC8884944F75D65B07964FA1
SHA-1: 0xDB95B69E3E42B172C81E6C32413C40364B544E87 Net-Worm.Bobic!sd5 [PCTools]
W32.Bobax.AJ@mm [Symantec]
Net-Worm.Win32.Bobic.n [Kaspersky Lab]
W32/Bobax.worm.gen@MM [McAfee]
WORM_BOBAX.BD [Trend Micro]
W32/Bobax-S [Sophos]
Worm:Win32/Bobax.U [Microsoft]
Net-Worm.Win32.Bobic [Ikarus]
Win32/Bobax.worm.43520 [AhnLab]
5 %System%lxtgldvy.exe 43 008 bytes MD5: 0x131117E06F5D6B2C8CDBEC3A63FC6163
SHA-1: 0x8629C5BCD5D273897B0D33BDFD3A46125987E11D Backdoor.Trojan [PCTools]
Backdoor.Trojan [Symantec]
P2P-Worm.Win32.Palevo.rmm [Kaspersky Lab]
Generic.dx!nns [McAfee]
Troj/DelfInj-E [Sophos]
VirTool:Win32/DelfInject.gen!BH [Microsoft]
Win32/Palevo.worm.52736.E [AhnLab]
6 %System%ojfchby.exe 43 008 bytes MD5: 0x9EB6DE0D4226C65F964E5DB470992AA5
SHA-1: 0x548A98A7F0F17D0E783D9367C30E8D8BA80A7C25 Adware.Lop [PCTools]
Adware.Lop [Symantec]
P2P-Worm.Win32.Palevo.rmm [Kaspersky Lab]
Generic.dx!nns [McAfee]
Troj/DelfInj-E [Sophos]
VirTool:Win32/DelfInject.gen!BH [Microsoft]
Win32/Palevo.worm.52736.E [AhnLab]
7 %System%spoolsvc.exe 224 788 bytes MD5: 0x9D84A7CC448456368914A620D305EEA8
SHA-1: 0xB38E68017D91D1FF52561904CCA5871689C75FB4 Trojan.IRCBot [PCTools]
W32.IRCBot [Symantec]
Net-Worm.Win32.Bobic.bc [Kaspersky Lab]
W32/Bobax.worm.gen [McAfee]
PE_BOBAX.AH [Trend Micro]
W32/Bobax-S [Sophos]
Virus:Win32/Bobax.A [Microsoft]
Win32/Bobic.worm.225280 [AhnLab]
8 %System%xeumiqrc.exe 43 008 bytes MD5: 0x58010458BD245244AC726EC0434262F5
SHA-1: 0x28983A7E246D240198E59996A0AC82E98CE5F394 Adware.Lop [PCTools]
Adware.Lop [Symantec]
P2P-Worm.Win32.Palevo.rmm [Kaspersky Lab]
Generic.dx!noa [McAfee]
Troj/DelfInj-E [Sophos]
VirTool:Win32/DelfInject.gen!BH [Microsoft]
Win32/Palevo.worm.52736.E [AhnLab]

Categories: Uncategorized
Previous post
Next post