Surila (b)
Copyright © MegaSecurity
By ?
Informations
Author | ? |
Family | Surila |
Category | Remote Access |
Version | Surila (b) |
Language | Microsoft Visual C++, compressed with UPX |
Additional Information
size: 57,344 bytes
port: 33440 TCP
added to registry:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_TCP32SEC\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec\Enum
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\tcp32sec\Security
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\l
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_TCP32SEC\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec\Enum
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\tcp32sec\Security
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "mutexname"
data: kSOSVXJ
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "sockport"
data: 33440
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer "spoofurl"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "devsec"
data: C:\WINDOWS\tcp32ss.exe
c:\windows\win.ini, [windows] "load"
value: tcp32ss.exe
tested on Windows XP
April 17, 2005
If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.