evaluator
January 17th, 2014, 14:12
file "~$WX.FAT" is DLL;
it will executed via shortcut by "rundll32.exe";
it's exported function "crys" will load file "desktop.ini",
which is program code for download/decrypt/execute file from:
"http://suckmycocklameavindustry.in/"
crypted file is "Thumbs.db";
decrypted is "TrustedInstaller.exe", which is "Nullsoft.NSIS.exehead";
it will unpack in "TEMP" folder these files:
"vesececune.ric",
"hewefuxasa.exe","Fewuxusahif.dll","vinoliwulab.dll","Hunoqoriqop.dll","Zayimahizo.dll"
and then will execute "hewefuxasa.exe" with it's 4 linked DLLs.
"hewefuxasa.exe"s job is "vesececune.ric" management..;
ahm, tired..
continued, with second atatchment
"hewefuxasa.exe"s job is "vesececune.ric" management:
decrypt "vesececune.ric" (see "vesececune.ric_decoded.bin"
,
start new process and inject there executable code (see "in_vesececune.ric.EXE"
.
"in_vesececune.ric.EXE" is last wrapper.
it has removal code for temporary files "hewefuxasa.exe" & it's DLLs (see "for_deletion.bin"
;
and fianlly it has in resource true body (see "compressed_true_NSIS.bin" & "true_NSIS.bin"
;
here we arrived to updated version of malware:
http://www.woodmann.com/forum/showthread.php?15082-just-today-infected-USB-flash
it also has "msiexec.exe", but now as NSIS executable..
PS
password for zip: malware
it will executed via shortcut by "rundll32.exe";
it's exported function "crys" will load file "desktop.ini",
which is program code for download/decrypt/execute file from:
"http://suckmycocklameavindustry.in/"
crypted file is "Thumbs.db";
decrypted is "TrustedInstaller.exe", which is "Nullsoft.NSIS.exehead";
it will unpack in "TEMP" folder these files:
"vesececune.ric",
"hewefuxasa.exe","Fewuxusahif.dll","vinoliwulab.dll","Hunoqoriqop.dll","Zayimahizo.dll"
and then will execute "hewefuxasa.exe" with it's 4 linked DLLs.
"hewefuxasa.exe"s job is "vesececune.ric" management..;
ahm, tired..
continued, with second atatchment
"hewefuxasa.exe"s job is "vesececune.ric" management:
decrypt "vesececune.ric" (see "vesececune.ric_decoded.bin"

start new process and inject there executable code (see "in_vesececune.ric.EXE"

"in_vesececune.ric.EXE" is last wrapper.
it has removal code for temporary files "hewefuxasa.exe" & it's DLLs (see "for_deletion.bin"

and fianlly it has in resource true body (see "compressed_true_NSIS.bin" & "true_NSIS.bin"

here we arrived to updated version of malware:
http://www.woodmann.com/forum/showthread.php?15082-just-today-infected-USB-flash
it also has "msiexec.exe", but now as NSIS executable..
PS
password for zip: malware