text
stringlengths 4
429
|
|---|
SIDT
|
method
|
detected
|
then
|
Trojan
|
decrypts
|
FAVORITES.DAT
|
file
|
spawns
|
svchost.exe
|
process
|
which
|
conducts
|
network
|
check-
|
ins.
|
This
|
evasion
|
reason
|
above
|
shown
|
failed
|
sandboxing
|
analysis
|
that
|
does
|
include
|
network
|
activity.
|
decrypted
|
FAVORITES.DAT
|
executable
|
this
|
sample
|
hash
|
www.virustotal.com/file-
|
scan/report.html?id=043935374ce39637a4816d0a484d30bed1d3054bbe89625fbc22f83ef4cb3e04-
|
1285736283
|
http://www.sophos.com/en-
|
us/threat-
|
center/threat-
|
analyses/viruses-
|
and-
|
spyware/Mal~Ovoxual-
|
B/detailed-
|
analysis.aspx
|
http://www.threatexpert.com/report.aspx?md5=374075ce8b6e8f0cd1f90009fd5a703b
|
http://www.cyberesi.com/2011/03/17/msupdate-
|
exe-
|
favorites-
|
dat-
|
analysis/
|
http://www.securiteam.com/securityreviews/6Z00H20BQS.html
|
2012
|
Zscaler
|
Inc.
|
Seculert
|
Ltd.
|
Rights
|
Reserved.
|
5E3EACA3806769836C3AD9D46A20964418
|
o Microsoft
|
other
|
vendors
|
detect
|
Backdoor
|
Matchaldru.B
|
o DrWeb
|
uses
|
their
|
same
|
Calla
|
family:
|
Backdoor.Calla.16
|
o The
|
VirusTotal
|
timeframe
|
submissions
|
this
|
decrypted
|
executable
|
from:
|
03/15/2011
|
04/20/2011.
|
Here
|
Google
|
decoy
|
beacon
|
made
|
Trojan:
|
Figure
|
Initial
|
Malformed
|
Google
|
HTTP
|
Request
|
Followed
|
initial
|
check-
|
request:
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.