text
stringlengths
4
429
pdf-
interest.html
https://www.virustotal.com/file/daac83fc4af5c53068c4e5a29dadfdc5200e3b3fc2b491eebe0a4bc19ec9e3f2/analysis/1285731514/
https://www.virustotal.com/file/ecefcd2f2b862e987ea4b6b7d475c924d9662ad955096872a2c5b822901c63b3/analysis/
http://www.sophos.com/en-
us/threat-
center/threat-
analyses/viruses-
and-
spyware/Mal~Ovoxual-
A/detailed-
analysis.aspx
http://anubis.iseclab.org/?action=result&task_id=14495366b24a64d242d1946aa1e3a88be&format=html
2012
Zscaler
Inc.
Seculert
Ltd.
Rights
Reserved.
Sophos
uniquely
detects13
Mal/
Ovoxual-
(added
07/19/2010)14
Sandbox
reports
this
sample
generally
fail15
showing
following
dialog
box:
Figure
ThreatExpert
Malware
Failure
Dialog
System
runtime
analysis
showed
initial
malformed
Google
query:
www.google.com/search?qu=
Figure
Malformed
Google
PCAP
During
Run-
Time
Analysis
Followed
failed
connection
attempts
140.112.19.195
(National
Taiwan
University)
further
detailed
static
analysis
this
msupdate.exe
FAVORITES.DAT
sample
completed
CyberESI16.
their
report
they
discuss
that
setup.exe
dropper
virtual
machine
(VM)
aware
using
SIDT
instruction17
detected,
msupdate.exe
Trojan
dropped.
msupdate.exe
Trojan
aware
using
same