Buster_BSA wrote:The sample is not sent. BSA sends the MD5 here:In this case - no problem :) So please disregard my p.1, but p.2.
http://www.virustotal.com/search.html
A forum for reverse engineering, OS internals and malware analysis
Buster_BSA wrote:The sample is not sent. BSA sends the MD5 here:In this case - no problem :) So please disregard my p.1, but p.2.
http://www.virustotal.com/search.html
OUT,TCP - HTTP,10.0.2.15,64.12.96.129:80,C:\Documents and Settings\User\Desktop\Piggy.exeAccording to Anubis logs there is no inbound connections.
IN,TCP - HTTP,64.12.96.129:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
IN,TCP - HTTP,198.78.212.126:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
IN,TCP - HTTP,213.248.111.235:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
IN,TCP - HTTP,195.12.231.10:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
gjf wrote:Question to developer - could you please respond?In the Anubis report you can see:
The question touches upon investigation of Qimiral sample. The network log includes the following lines:OUT,TCP - HTTP,10.0.2.15,64.12.96.129:80,C:\Documents and Settings\User\Desktop\Piggy.exeAccording to Anubis logs there is no inbound connections.
IN,TCP - HTTP,64.12.96.129:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
IN,TCP - HTTP,198.78.212.126:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
IN,TCP - HTTP,213.248.111.235:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
IN,TCP - HTTP,195.12.231.10:80,10.0.2.15,C:\Documents and Settings\User\Desktop\Piggy.exe
So how can it be explained: according to log it is TCP connections and they are associated with malware file, is it false?