Technical Information
Malicious functions:
Creates and executes the following:
- %TEMP%\IDM_Setup_Temp\IDM1.tmp -d "%TEMP%\IDM_Setup_Temp\"
- %TEMP%\idman518.exe
Searches for registry branches where third party applications store passwords:
- [<HKLM>\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Trillian]
- [<HKCU>\Software\Paltalk]
Searches for windows to
detect programs and games:
- ClassName: '' WindowName: 'Yahoo! Messenger'
Modifies file system :
Creates the following files:
- %PROGRAM_FILES%\hackhound.txt
- %TEMP%\idman518.exe
- %PROGRAM_FILES%\hide.dll
Deletes the following files:
- %PROGRAM_FILES%\hackhound.txt
Network activity:
Connects to:
- 'ft#.##scales.com':21
- 'localhost':1036
UDP:
- DNS ASK ft#.##scales.com
Miscellaneous:
Searches for the following windows:
- ClassName: 'Shell_TrayWnd' WindowName: ''