I thought this was interesting. New ramnit still being pushed by Angler.
http://www.kernelmode.info/forum/viewto ... 295#p28142
sample 99f21ba5b02b3085c683ea831d79dc79 examined on win7
https://www.virustotal.com/en/file/0d52 ... /analysis/
NSIS dropper for Ramnit
reduces security turns off firewall
windows security center service off
copies self to %temp%
dumps dlls in roaming temp
add exe to startup menu
HKLM\software\microsoft\windows nt\currentversion\winlogon\Userinit
registers two services via svchost.exe (attach)
port scans local subnet tcp/110 tcp/139
opens port tcp/23 LISTENING
http get macromedia flash download > 404
active C&C (or C&C proxy)
tcp 188.93.211.67:443 (ru) gugendolik.com
NSIS script 'raw' trick
http://stackoverflow.com/questions/3431 ... 69#3431269
my offset: 00402E5D
produces file: 514d9131fb386b22c64ae2568236228b nsyAD6F.tmp
cathouses
Paraldehyde
villeinage.dll exports > Chihuahua
99f21ba5b02b3085c683ea831d79dc79 lugdbbmp.exe
cfc171e42ed3fd73502424f37a55dc53 MilageAorta
514d9131fb386b22c64ae2568236228b nsyAD6F.tmp
99f21ba5b02b3085c683ea831d79dc79 sbnvyybh.exe
99f21ba5b02b3085c683ea831d79dc79 smvohluj.exe
11d49157689a21b549dd6399e78c5a0a System.dll
cfa194068f62843ef36a5c31e2576b53 villeinage.dll
c2a126b2dd4fb7c6fbe19eb7064f214d Warsaw
2bcd3e6fdde56ee3e5d39b33dd236fec -other sample on VT
https://www.virustotal.com/en/file/a305 ... /analysis/
https://www.virustotal.com/en/file/3475 ... /analysis/