kenzero in attachment.
Code: Select allftp96.heteml.jp - 157.7.188.228
157.7.188.228:21 RESPONSE 220 157.7.188.228 FTP server ready
157.7.188.228:21 COMMAND USER p3p
157.7.188.228:21 RESPONSE 331 Password required for p3p
157.7.188.228:21 COMMAND PASS sameru
157.7.188.228:21 RESPONSE 530 Login incorrect.
The japanese version of symantec signature db have even screenshots
https://www.symantec.com/ja/jp/security ... 99&tabid=2
about the sample:
Code: Select allC:\Users\KENZO\Documents\Visual Studio 2008\Projects\PasswordTrap\PasswordTrap\obj\Debug\Setup.pdb
MSIL, drive letter in hard inside, buggy code and terrible programming everywhere.
not worth to look, just an infostealer who take/send a screenshot via ftp and count on you with social engineering for the rest.
seem getting rid of it easy as ctrl+f and aslo no startup persistence and self-remove.
the random sub, looks like a recycled code from a password generator
Code: Select allprivate static string strPasswordChar_A = "abcdefghijlkmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789";
public static string GetRandom()
{
Random random = new Random((int) (DateTime.Now.Ticks % 0x7fffffffL));
return (((((((((((((((strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1)) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1) + strPasswordChar_A.Substring(random.Next(strPasswordChar_A.Length), 1));
'ip retrieving' in module and rest in main form, things looks like more an assembly of various codes than something else
it doesn't steal internet history and no it's not a popular thing, usually they just says that to scare user and sometime display a random url you browsed to convince.
most of time tactic is just about pedo and fake police charge, ransomwares nowaday doesn't even care about that, they just encrypt anything they can and ask cash for recovery.