Technical Information
To ensure autorun and distribution:
Modifies the following registry keys:
- [<HKCU>\Software\Microsoft\Windows\CurrentVersion\Run] 'SunJavaUpdateSched' = '%APPDATA%\jusched.exe'
Malicious functions:
Creates and executes the following:
- %APPDATA%\jusched.exe
Injects code into
the following system processes:
- <SYSTEM32>\svchost.exe
Modifies file system :
Creates the following files:
- %TEMP%\windump.exe
- %APPDATA%\jusched.exe
Sets the 'hidden' attribute to the following files:
- %APPDATA%\jusched.exe
Network activity:
Connects to:
- '15#.#16.101.123':4444
- '19#.#23.119.22':4444
- '90.##.212.121':4444
- '16#.#29.138.66':4444
- '21#.#.155.219':4444
- '11#.#57.10.175':4444
- '17#.#10.117.54':4444
- '??###############??????????????????????????????????.localdomain':6667
- '56.##5.189.55':4444
- '51.##.155.49':4444
- '23.##1.56.205':4444
- '17#.#01.213.181':4444
- '24#.#07.103.184':4444
- '<Private IP address>':80
- '<Private IP address>':445
- '10#.#52.55.129':4444
- '31.##1.120.82':4444
- '60.##.102.165':4444
- '12#.#7.120.167':4444
- '19.##8.84.12':4444
- '97.#6.10.85':4444
- '13#.#0.28.110':4444
Miscellaneous:
Searches for the following windows:
- ClassName: 'Indicator' WindowName: ''