본문 바로가기
Malwares 분석

rege.exe

by 글벌레 2009. 2. 5.
반응형
 rege.exe  File size: 66560 bytes
MD5 : 7fe517a3889c587f6affbafb16c3fe83
  파일②는  rege.exe 생성시 생성 .  파일③은 바로 아래 ②twex.exe 가 실행시 변경 >생성되는 파일
 ② twex.exe  File size: 571904 bytes
MD5 : bdefdfbf085050213d36a5406fa83fb3
 ③ twex.exe  File size: 782336 bytes
MD5 : c1c439ac342d4b8651827cf319ba87b6

rege.exe 의 바이러스 토탈 검사 결과

검사 파일: rege.exe 전송 시각: 2009.02.04 17:12:07 (CET)
안티바이러스 엔진 버전 정의 날짜 검사 결과
a-squared 4.0.0.93 2009.02.04 Trojan-Spy.Win32.Zbot!IK
AhnLab-V3 5.0.0.2 2009.02.04 -
AntiVir 7.9.0.71 2009.02.04 TR/Spy.ZBot.kqb
Authentium 5.1.0.4 2009.02.04 -
Avast 4.8.1281.0 2009.02.03 Win32:Zbot-AYV
AVG 8.0.0.229 2009.02.04 Win32/Cryptor
BitDefender 7.2 2009.02.04 Backdoor.Bot.78656
CAT-QuickHeal 10.00 2009.02.04 TrojanSpy.Zbot.kqb
ClamAV 0.94.1 2009.02.04 Trojan.Zbot-2961
Comodo 964 2009.02.04 -
DrWeb 4.44.0.09170 2009.02.04 -
eSafe 7.0.17.0 2009.02.01 Win32.Kryptik.fh
eTrust-Vet 31.6.6341 2009.02.04 Win32/Kollah.VR
F-Prot 4.4.4.56 2009.02.04 -
F-Secure 8.0.14470.0 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
Fortinet 3.117.0.0 2009.02.04 W32/PWS.Y!tr
GData 19 2009.02.04 Backdoor.Bot.78656
Ikarus T3.1.1.45.0 2009.02.04 Trojan-Spy.Win32.Zbot
K7AntiVirus 7.10.618 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
Kaspersky 7.0.0.125 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
McAfee 5515 2009.02.03 Generic PWS.y
McAfee+Artemis 5515 2009.02.03 Generic PWS.y
Microsoft 1.4306 2009.02.04 PWS:Win32/Zbot.gen!R
NOD32 3825 2009.02.04 Win32/Spy.Zbot.HI
Norman 6.00.02 2009.02.04 W32/Zbot.CBW
nProtect 2009.1.8.0 2009.02.04 Trojan-Spy/W32.ZBot.66560.J
Panda 9.5.1.2 2009.02.03 Trj/Sinowal.DW
PCTools 4.4.2.0 2009.02.03 -
Prevx1 V2 2009.02.04 -
Rising 21.15.20.00 2009.02.04 -
SecureWeb-Gateway 6.7.6 2009.02.04 Trojan.Spy.ZBot.kqb
Sophos 4.38.0 2009.02.04 Troj/ZbotPP-Fam
Sunbelt 3.2.1835.2 2009.01.16 -
Symantec 10 2009.02.04 Infostealer.Banker.C
TheHacker 6.3.1.5.246 2009.02.04 Trojan/Spy.Zbot.kqb
TrendMicro 8.700.0.1004 2009.02.04 -
VBA32 3.12.8.12 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
ViRobot 2009.2.4.1589 2009.02.04 Trojan.Win32.Zbot.66560.AK
VirusBuster 4.5.11.0 2009.02.04 -
 
추가 정보
File size: 66560 bytes
MD5...: 7fe517a3889c587f6affbafb16c3fe83
SHA1..: 8ea04242b8ba89871c261fb29368823446ba6900
SHA256: a5c1b94a13abc83bd065c2c44c6df934950a3ebd2ca0a5535bac638124b46b98
SHA512: da82fb46e542b3222e0ea5e37b3334b6874568ddda7d6fa4b985b877429eaacf
b8c5dca5239c68bf6199a5ebc8b41e23d460d7181363e94b4a70f67efa1c5a3e
ssdeep: 1536:WgzOvajIMk2mZllQFUHf4Uwld/Rj5vP65KdtL67UHrN7DT+o:UPlyH/zvS5
KdFV3
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (38.4%)
Win32 Dynamic Link Library (generic) (34.1%)
Win16/32 Executable Delphi generic (9.3%)
Generic Win/DOS Executable (9.0%)
DOS Executable Generic (9.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x40ca
timedatestamp.....: 0x478fbe42 (Thu Jan 17 20:44:50 2008)
machinetype.......: 0x14c (I386)

( 2 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0xfc1c 0xfe00 6.77 ac53c3bfadf3f6a20f1ce6766535621c
.data 0x11000 0x4115 0x200 0.76 cde6ecbaf8635588ba78a93aa7578626

( 4 imports )
> USER32.dll: GetForegroundWindow, FindWindowExA, SetThreadDesktop, GetKeyboardState, GetWindowThreadProcessId, ToUnicode, GetWindowLongA, EndDialog, MsgWaitForMultipleObjects, GetClassNameA, LoadCursorA, GetIconInfo, CloseDesktop, OpenDesktopA, SetProcessWindowStation, GetKeyState, DispatchMessageA
> KERNEL32.dll: GlobalUnlock, SetFilePointer, lstrcmpiW, VirtualProtect, GetFileAttributesA, HeapAlloc, lstrlenA, GetModuleFileNameW, FindNextFileW, VirtualAlloc, ReleaseMutex, HeapFree, GetProcAddress, GetSystemTimeAsFileTime, lstrcatW, GetFileSize, GetLastError, lstrcpyA, HeapReAlloc, CreateMutexW, lstrcpyW, GetUserDefaultUILanguage, GetTimeZoneInformation
> ADVAPI32.dll: RegCreateKeyExA, DuplicateTokenEx, RegEnumKeyExA, CryptAcquireContextW, CryptCreateHash, CryptGetHashParam, RegSetValueExA, RegDeleteValueA, CryptReleaseContext, GetUserNameW, RegQueryValueExA, RegCloseKey
> SHLWAPI.dll: PathRemoveFileSpecW, PathFileExistsW, StrCmpNIA, wnsprintfW, PathCombineW, wvnsprintfW, PathMatchSpecW, wvnsprintfA, wnsprintfA, PathFindFileNameW, StrCmpNIW, SHDeleteKeyA

( 0 exports )

twex.exe 의 바이러스 토탈 검사 결과

검사 파일: twex.exe 전송 시각: 2009.02.04 17:24:54 (CET)
안티바이러스 엔진 버전 정의 날짜 검사 결과
a-squared 4.0.0.93 2009.02.04 -
AhnLab-V3 5.0.0.2 2009.02.04 -
AntiVir 7.9.0.71 2009.02.04 TR/Dropper.Gen
Authentium 5.1.0.4 2009.02.04 -
Avast 4.8.1281.0 2009.02.03 Win32:Zbot-AYV
AVG 8.0.0.229 2009.02.04 Win32/Cryptor
BitDefender 7.2 2009.02.04 Backdoor.Bot.78656
CAT-QuickHeal 10.00 2009.02.04 TrojanSpy.Zbot.kqb
ClamAV 0.94.1 2009.02.04 Trojan.Zbot-2961
Comodo 964 2009.02.04 -
DrWeb 4.44.0.09170 2009.02.04 -
eSafe 7.0.17.0 2009.02.01 -
eTrust-Vet 31.6.6341 2009.02.04 Win32/Kollah.VR
F-Prot 4.4.4.56 2009.02.04 -
F-Secure 8.0.14470.0 2009.02.04 -
Fortinet 3.117.0.0 2009.02.04 -
GData 19 2009.02.04 Backdoor.Bot.78656
Ikarus T3.1.1.45.0 2009.02.04 -
K7AntiVirus 7.10.618 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
Kaspersky 7.0.0.125 2009.02.04 -
McAfee 5515 2009.02.03 -
McAfee+Artemis 5515 2009.02.03 -
Microsoft 1.4306 2009.02.04 PWS:Win32/Zbot.gen!R
NOD32 3826 2009.02.04 Win32/Spy.Zbot.HI
Norman 6.00.02 2009.02.04 W32/Zbot.CBW
nProtect 2009.1.8.0 2009.02.04 Trojan-Spy/W32.ZBot.66560.J
Panda 9.5.1.2 2009.02.03 -
PCTools 4.4.2.0 2009.02.03 -
Prevx1 V2 2009.02.04 -
Rising 21.15.20.00 2009.02.04 -
SecureWeb-Gateway 6.7.6 2009.02.04 Trojan.Dropper.Gen
Sophos 4.38.0 2009.02.04 Troj/ZbotPP-Fam
Sunbelt 3.2.1835.2 2009.01.16 -
Symantec 10 2009.02.04 Infostealer.Banker.C
TheHacker 6.3.1.5.246 2009.02.04 Trojan/Spy.Zbot.kqb
TrendMicro 8.700.0.1004 2009.02.04 -
VBA32 3.12.8.12 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
ViRobot 2009.2.4.1589 2009.02.04 Trojan.Win32.Zbot.66560.AK
VirusBuster 4.5.11.0 2009.02.04 -
 
추가 정보
File size: 571904 bytes
MD5...: bdefdfbf085050213d36a5406fa83fb3
SHA1..: 742466fd9c84c41e2e6cc227b2d9f620ff0bbd76
SHA256: f5faa68d76e78416041b3cb92afe891ca2bf2a71ed124f31d9fab9d4b3193253
SHA512: a786d3ff1116509fd0bcc91e4a59f3b6a1b74da489fe4deefba8f538a5627f5b
b55174bd010705abfeacd731e66aa21961d01b632a0c9102a6ecd51676f4429e
ssdeep: 12288:Bqo3iYvJCKMV8hKRE91x+K57aGc4LMsnZYp09xm:B13i2JC/GKmVJzR4/
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (38.4%)
Win32 Dynamic Link Library (generic) (34.1%)
Win16/32 Executable Delphi generic (9.3%)
Generic Win/DOS Executable (9.0%)
DOS Executable Generic (9.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x40ca
timedatestamp.....: 0x478fbe42 (Thu Jan 17 20:44:50 2008)
machinetype.......: 0x14c (I386)

( 2 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0xfc1c 0xfe00 6.77 ac53c3bfadf3f6a20f1ce6766535621c
.data 0x11000 0x4115 0x200 0.76 cde6ecbaf8635588ba78a93aa7578626

( 4 imports )
> USER32.dll: GetForegroundWindow, FindWindowExA, SetThreadDesktop, GetKeyboardState, GetWindowThreadProcessId, ToUnicode, GetWindowLongA, EndDialog, MsgWaitForMultipleObjects, GetClassNameA, LoadCursorA, GetIconInfo, CloseDesktop, OpenDesktopA, SetProcessWindowStation, GetKeyState, DispatchMessageA
> KERNEL32.dll: GlobalUnlock, SetFilePointer, lstrcmpiW, VirtualProtect, GetFileAttributesA, HeapAlloc, lstrlenA, GetModuleFileNameW, FindNextFileW, VirtualAlloc, ReleaseMutex, HeapFree, GetProcAddress, GetSystemTimeAsFileTime, lstrcatW, GetFileSize, GetLastError, lstrcpyA, HeapReAlloc, CreateMutexW, lstrcpyW, GetUserDefaultUILanguage, GetTimeZoneInformation
> ADVAPI32.dll: RegCreateKeyExA, DuplicateTokenEx, RegEnumKeyExA, CryptAcquireContextW, CryptCreateHash, CryptGetHashParam, RegSetValueExA, RegDeleteValueA, CryptReleaseContext, GetUserNameW, RegQueryValueExA, RegCloseKey
> SHLWAPI.dll: PathRemoveFileSpecW, PathFileExistsW, StrCmpNIA, wnsprintfW, PathCombineW, wvnsprintfW, PathMatchSpecW, wvnsprintfA, wnsprintfA, PathFindFileNameW, StrCmpNIW, SHDeleteKeyA

( 0 exports )

③ twex.exe 의 바이러스 토탈 검사 결과

검사 파일: twex.exe 전송 시각: 2009.02.04 17:34:14 (CET)
안티바이러스 엔진 버전 정의 날짜 검사 결과
a-squared 4.0.0.93 2009.02.04 -
AhnLab-V3 5.0.0.2 2009.02.04 -
AntiVir 7.9.0.71 2009.02.04 TR/Dropper.Gen
Authentium 5.1.0.4 2009.02.04 -
Avast 4.8.1281.0 2009.02.03 Win32:Zbot-AYV
AVG 8.0.0.229 2009.02.04 Win32/Cryptor
BitDefender 7.2 2009.02.04 Backdoor.Bot.78656
CAT-QuickHeal 10.00 2009.02.04 TrojanSpy.Zbot.kqb
ClamAV 0.94.1 2009.02.04 Trojan.Zbot-2961
Comodo 964 2009.02.04 -
DrWeb 4.44.0.09170 2009.02.04 -
eSafe 7.0.17.0 2009.02.01 -
eTrust-Vet 31.6.6341 2009.02.04 Win32/Kollah.VR
F-Prot 4.4.4.56 2009.02.04 -
F-Secure 8.0.14470.0 2009.02.04 -
Fortinet 3.117.0.0 2009.02.04 -
GData 19 2009.02.04 Backdoor.Bot.78656
Ikarus T3.1.1.45.0 2009.02.04 -
K7AntiVirus 7.10.618 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
Kaspersky 7.0.0.125 2009.02.04 -
McAfee 5515 2009.02.03 -
McAfee+Artemis 5515 2009.02.03 -
Microsoft 1.4306 2009.02.04 PWS:Win32/Zbot.gen!R
NOD32 3826 2009.02.04 Win32/Spy.Zbot.HI
Norman 6.00.02 2009.02.04 W32/Zbot.CBW
nProtect 2009.1.8.0 2009.02.04 Trojan-Spy/W32.ZBot.66560.J
Panda 9.5.1.2 2009.02.03 -
PCTools 4.4.2.0 2009.02.03 -
Prevx1 V2 2009.02.04 -
Rising 21.15.20.00 2009.02.04 -
SecureWeb-Gateway 6.7.6 2009.02.04 Trojan.Dropper.Gen
Sophos 4.38.0 2009.02.04 Troj/ZbotPP-Fam
Sunbelt 3.2.1835.2 2009.01.16 -
Symantec 10 2009.02.04 Infostealer.Banker.C
TheHacker 6.3.1.5.246 2009.02.04 Trojan/Spy.Zbot.kqb
TrendMicro 8.700.0.1004 2009.02.04 -
VBA32 3.12.8.12 2009.02.04 Trojan-Spy.Win32.Zbot.kqb
ViRobot 2009.2.4.1589 2009.02.04 Trojan.Win32.Zbot.66560.AK
VirusBuster 4.5.11.0 2009.02.04 -
 
추가 정보
File size: 782336 bytes
MD5...: c1c439ac342d4b8651827cf319ba87b6
SHA1..: 3bc0ff6f1c8c1a800739fad93e142192ad077654
SHA256: fe8c085b9c68e6ee364b9607ef0c14d26945a86cbb4c3ca40be1549d074dc9b7
SHA512: d22c5aa72bbedc1bee7747eb90f9fca5d3e73a0379797dbe4812ebee6a26494d
e9f505199de066e8100d0b9e101d2c3df999bb31bf186ef398314ae9380bbf36
ssdeep: 12288:Bqo3iYvJCKMV8hKRE91x+K57aGc4LMsnZYp09xb7iF35j/OJ5FzxRqbKun
:B13i2JC/GKmVJzR4K7ixy5tCbKun
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (38.4%)
Win32 Dynamic Link Library (generic) (34.1%)
Win16/32 Executable Delphi generic (9.3%)
Generic Win/DOS Executable (9.0%)
DOS Executable Generic (9.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x40ca
timedatestamp.....: 0x478fbe42 (Thu Jan 17 20:44:50 2008)
machinetype.......: 0x14c (I386)

( 2 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0xfc1c 0xfe00 6.77 ac53c3bfadf3f6a20f1ce6766535621c
.data 0x11000 0x4115 0x200 0.76 cde6ecbaf8635588ba78a93aa7578626

( 4 imports )
> USER32.dll: GetForegroundWindow, FindWindowExA, SetThreadDesktop, GetKeyboardState, GetWindowThreadProcessId, ToUnicode, GetWindowLongA, EndDialog, MsgWaitForMultipleObjects, GetClassNameA, LoadCursorA, GetIconInfo, CloseDesktop, OpenDesktopA, SetProcessWindowStation, GetKeyState, DispatchMessageA
> KERNEL32.dll: GlobalUnlock, SetFilePointer, lstrcmpiW, VirtualProtect, GetFileAttributesA, HeapAlloc, lstrlenA, GetModuleFileNameW, FindNextFileW, VirtualAlloc, ReleaseMutex, HeapFree, GetProcAddress, GetSystemTimeAsFileTime, lstrcatW, GetFileSize, GetLastError, lstrcpyA, HeapReAlloc, CreateMutexW, lstrcpyW, GetUserDefaultUILanguage, GetTimeZoneInformation
> ADVAPI32.dll: RegCreateKeyExA, DuplicateTokenEx, RegEnumKeyExA, CryptAcquireContextW, CryptCreateHash, CryptGetHashParam, RegSetValueExA, RegDeleteValueA, CryptReleaseContext, GetUserNameW, RegQueryValueExA, RegCloseKey
> SHLWAPI.dll: PathRemoveFileSpecW, PathFileExistsW, StrCmpNIA, wnsprintfW, PathCombineW, wvnsprintfW, PathMatchSpecW, wvnsprintfA, wnsprintfA, PathFindFileNameW, StrCmpNIW, SHDeleteKeyA

( 0 exports )

rege.exe 실행시 시스템 변경 사항 .
파일 변경 사항

C:\WINDOWS\system32\twex.exe (571904 bytes) 생성 (②번)

레지스트리 변경 사항

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt
\currentversion\winlogon]
"userinit"="C:\WINDOWS\system32\userinit.exe,"

위 정상 값을

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt
\currentversion\winlogon]
"userinit"="C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\twex.exe,"

으로 변경 .

② twex.exe 실행시 시스템 변경 사항 .
 파일 변경 사항

C\WINDOWS\system32\twex.exe (782336 bytes) 생성 (③번)

 알려진 레지스트리와 파일로써 악성툴을 삭제 하려면 ?

2009/02/02 - [유용한 팁들] - 레지스트리 항목(.reg) 파일 사용법


2009/02/04 - [유용한 팁들] - movefile 활용


반응형

'Malwares 분석' 카테고리의 다른 글

update.exe  (0) 2009.02.15
load.exe  (0) 2009.02.15
r.exe  (2) 2009.02.14
twixz.exe  (0) 2009.02.13
keygen.LimeWire.5.0.6.PRo.exe  (0) 2009.02.06
loader.exe  (0) 2009.02.05
ldr.exe  (0) 2009.02.03
svchost.exe  (0) 2009.01.31

댓글