Generic.PUP/Hacktool
Valkyrie Final Verdict: CLEAN
Some suspicious/malicious Indicators : Compiler/Packer signature > Compiler: Microsoft Visual C++ 8.0 , Packer: aPLib Compression , File has multiple binary anomalies ( File ignores Code Integrity , CRC value set in PE header does not match actual value , Imports sensitive Libarys ( Windows image helper ) , The file contains another files (type: Executable, location: resources, file-offset: 0x000CBB90, 0x000DACD0, 0x000E9C10, 0x000F8B50 ) , Found BlackBone Driver injector, Expects Administrative permission, References “2” Windows built-in privileges, Tries to detect the presence of a debugger, Contains known anti-VM tricks ( Found VM detection artifact “CPUID trick”, Anti-Sandbox checks for ThreatExpert ) , Contains native function calls , Contains ability to create a remote thread , Contains ability to enumerate processes/modules/threads, Contains ability to register a top-level exception handler , Found strings in conjunction with a procedure lookup that resolve to a known API export symbol , Tries do delay/evade the analysis , Installs itself for autorun at Windows startup , Reads the active computer name , Drops system driver , Loads device driver, Installs hooks/patches the running process, Creates and modifies windows services, Opens the Kernel Security Device Driver, Generates some ICMP Traffic
Generic.Hacktool/Trojan
Valkyrie Final Verdict: No Threat Found
Some suspicious/malicious Indicators : Compiler/Packer signature > Compiler: Microsoft Visual C++ 5.0 , Packer: Armadillo v1.71 , File has multiple binary anomalies ( File ignores DEP , File ignores Code Integrity , Checksum mismatches the PE header value , Contains unknwon resources , Timestamp in PE header is very old ( Tue Nov 9 11:37:39 1999 , Foreign language identified in PE resource ( Chinese ) ) , Found a potential E-Mail address in binary/memory ( “laingml[at]163.net” ) , Tries to detect the presence of a debugger, Scanning for window names , Monitors specific registry key for changes , Reads terminal service related keys , Installs hooks/patches the running process ( “NSI.DLL” ) , Touches files in the Windows directory , Opens the Kernel Security Device Driver , Communicates with host for which no DNS query was performed ( “2.16.155.9” , “2.18.77.109” , “212.247.14.11” ) , Sends traffic on typical HTTP outbound port, but without HTTP header ( TCP traffic to “172.217.16.174” on port “443” )