text
stringlengths
4
429
SIDT
method
detected
then
Trojan
decrypts
FAVORITES.DAT
file
spawns
svchost.exe
process
which
conducts
network
check-
ins.
This
evasion
reason
above
shown
failed
sandboxing
analysis
that
does
include
network
activity.
decrypted
FAVORITES.DAT
executable
this
sample
hash
www.virustotal.com/file-
scan/report.html?id=043935374ce39637a4816d0a484d30bed1d3054bbe89625fbc22f83ef4cb3e04-
1285736283
http://www.sophos.com/en-
us/threat-
center/threat-
analyses/viruses-
and-
spyware/Mal~Ovoxual-
B/detailed-
analysis.aspx
http://www.threatexpert.com/report.aspx?md5=374075ce8b6e8f0cd1f90009fd5a703b
http://www.cyberesi.com/2011/03/17/msupdate-
exe-
favorites-
dat-
analysis/
http://www.securiteam.com/securityreviews/6Z00H20BQS.html
2012
Zscaler
Inc.
Seculert
Ltd.
Rights
Reserved.
5E3EACA3806769836C3AD9D46A20964418
o Microsoft
other
vendors
detect
Backdoor
Matchaldru.B
o DrWeb
uses
their
same
Calla
family:
Backdoor.Calla.16
o The
VirusTotal
timeframe
submissions
this
decrypted
executable
from:
03/15/2011
04/20/2011.
Here
Google
decoy
beacon
made
Trojan:
Figure
Initial
Malformed
Google
HTTP
Request
Followed
initial
check-
request: