Somoto
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Threat Level: | 80 % (High) |
| Infected Computers: | 3 |
| First Seen: | August 26, 2011 |
| Last Seen: | October 24, 2025 |
| OS(es) Affected: | Windows |
The Somoto browser hijacker is a malicious toolbar and malware infection that is typically included in some freeware downloads. The Somoto browser hijacker and toolbar has been associated with several free applications for playing .flv movies (such as downloaded YouTube movies. The Somoto browser hijacker significantly alters your computer's browsing behavior. This malicious infection can cause your Internet browser to redirect you constantly to the somoto.com website. This website is a fake version of the Google search engine, designed to display results that are associated with malware and Trojan infections. If your Internet browser is constantly directing you to the Somoto website, ESG PC security researchers strongly recommend booting your PC in Safe Mode. Then, it is important that you use a fully-updated anti-malware utility to detect and remove the Somoto browser hijacker and its associated malware.
Table of Contents
The Underlying Cause of the Somoto Infection
Most cases of infection with the Somoto browser hijacker are associated with a video application named FLV & AVI player. There are several versions of this freeware application. As part of its installation process, this program will install the Somoto toolbar and browser hijacker onto your computer. If you remove Somoto, the video player associated with Somoto will often refuse to open. ESG PC security researchers strongly recommend avoiding any applications that force you to download and install the Somoto toolbar. There are numerous free, effective video players that can give you great results without needing to download malware or install a bulky, malicious toolbar onto your Internet browser (for example, the VLC video player).
Problems Associated with the Somoto Browser Hijacker
The Somoto browser hijacker has several harmful effects on a computer system. Computer users that have become infected with this malicious toolbar report that their Internet browser homepage has been changed. The Somoto browser hijacker can also redirect your web browsing, sending you to websites that contain malicious advertisements and malware-ridden links. The Somoto infection acts as a gateway through which other more dangerous kinds of malware can infect your computer system. It is because of this that ESG PC security researchers strongly advise against leaving a Somoto infection on your computer. Having the ability to play .flv video files is not worth the risk or the annoyance of having the Somoto toolbar installed onto your computer. Other free and safe alternatives exist that can allow you to watch any format of video on your computer system.
File System Details
| # | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|
| 1. | C:Program Filessomototoolbar[RANDOM CHARACTERS].exe |
Registry Details
Analysis Report
General information
| Family Name: | Trojan.Somoto |
|---|---|
| Signature status: | Root Not Trusted |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
306195070e249ecd756a4367e8bd585d
SHA1:
97763e6a25238b6096fe4850b26c199af0266e91
File Size:
4.78 MB, 4783892 bytes
|
|
MD5:
0737a21f1a1292500d23ea95577aba7a
SHA1:
dbc2ded36407673d6e11c0de5d758413602b68af
File Size:
162.09 KB, 162088 bytes
|
|
MD5:
07d1be88fb2d9e700e835019c153e4db
SHA1:
1722c50cb846447538d80bde7fdab032aaa0b36d
SHA256:
23F4FC00AA55F5CDBBE66D1762D3C39017A49307296B51984C2248BF97C6C98B
File Size:
430.94 KB, 430944 bytes
|
|
MD5:
1a79ca43270998428ceb02d6a3b1bbde
SHA1:
741cd1617ca732a9557aae6adc94b09ed834a528
SHA256:
88869E7AA01AD49346EC3AAFD8CBC855FBA20A896A00A16853A535883543A337
File Size:
2.37 MB, 2369795 bytes
|
|
MD5:
cc4929c63dc71bc807f9853ce7ff37c9
SHA1:
9bd2c2fe08bb00530030da2bbdad35cc5b73d120
SHA256:
84BA61A76571E6C100700AA91483485590F4C2C47181EA2718CEBC2175C03766
File Size:
170.84 KB, 170840 bytes
|
Show More
|
MD5:
b5f7787e036a7ae9c5eed54156ea0a1c
SHA1:
bbea846b428327d7751ba55c2d187c46c6ede75b
SHA256:
5AE2B9A539438EB9DBE3548AC6FC17DCF12F52763C9FE3EF2E0BFF8FCF2D3FE7
File Size:
430.56 KB, 430560 bytes
|
|
MD5:
90b3c3888b48fc3f19ffa24d0708b809
SHA1:
772f121128a1196fb3a0902685bd2c3ce977df47
SHA256:
9173CBB0B3BCE89051F837619087421C690642658E97DC4BDA9834EA97E3E244
File Size:
163.53 KB, 163528 bytes
|
|
MD5:
c7b068ec2bb94d52f46c03279ecb77c2
SHA1:
7e967b2ac7d5c358275ada39ad23d5cb9aa4337c
SHA256:
D2E42F67AF210A73D07D5EE7D8B37E362304F4853B5BB02DEDE1CB08A483E9DB
File Size:
413.26 KB, 413264 bytes
|
|
MD5:
fd466b320b77d42012f340ff2e58ae37
SHA1:
1daefe7b77508ca24e22f2062d1765842b47ae93
SHA256:
2158CCD1EF2A1AE39207DD47F8C0A27FEC27F510B5E6546EB9CAF289EDC68A43
File Size:
166.60 KB, 166600 bytes
|
|
MD5:
b476b31c1dc169000605037a1aded5c9
SHA1:
9e302ae3fc6f3434fb09fc1ce1a098f7851aec17
SHA256:
B7FDFE32F07EDA4C31E0DCD99D2527C06E9E15274E75D03CF58B97C45BB49CD3
File Size:
430.91 KB, 430912 bytes
|
|
MD5:
0e2549d6bbb8f47b0da0f2c4ea9294ee
SHA1:
74c5c8ea59a93322f7d5426f7ea3512175b8dda0
SHA256:
C658BEE5CE338A9486646AE27571DFA9CF67B658B3116CDEF5CFB3294826C97A
File Size:
430.93 KB, 430928 bytes
|
|
MD5:
3487fb79614eb5f3278fc7371a2c596c
SHA1:
4ca3823b1c611860366c4b63ec23fcbeeca03c73
SHA256:
807AA0C350B4B99E78A3233A8ECAF4D477074AB9AC96283F2063E2FFB830E17B
File Size:
236.96 KB, 236960 bytes
|
|
MD5:
9937d85fdb91104eb94ed53d22c80f21
SHA1:
aea262c84019e2d2fcdf419467f0ed9ce6137eae
SHA256:
67B635E7A1EB79EDE75E1E57B36AE9686B3F8BB66AFFEB4B5BB6BA294E1B45D8
File Size:
432.39 KB, 432392 bytes
|
|
MD5:
13b1812acb56442725f20305c0a91fa0
SHA1:
84b9b21c9f5e073f240513816b47c763accd34fb
SHA256:
2F9AD41309F0F656A7C6CE6FF0EC2A8ADEB759A4EB00C362053990A83007098D
File Size:
430.34 KB, 430344 bytes
|
|
MD5:
35a519a17ebebd6fad23144f985294bf
SHA1:
550a4bfbf4e75515f0ca5126eb3dc855331b4be2
SHA256:
2D49BB97C7090BE1BBD115CFA713DC197C98EEB40F3E4E2CA74C4B4BAEC1EE42
File Size:
68.21 KB, 68214 bytes
|
|
MD5:
917f14c5bf8e2e79a8512dec476c3805
SHA1:
5f235e599141555f7dffce810d972efd21e54760
SHA256:
31A949D4F73D27CF33895C73268AB79F3F56568FF07BCA7FD3B6C72B85C05AC2
File Size:
79.49 KB, 79490 bytes
|
|
MD5:
d430c87440fc644d6bbf710ab98402b6
SHA1:
c15237e60cd3a6df282d2be7155556140ef7e331
SHA256:
2CFCB3B5E3661FE6714BC1E9B8F017E740B0213E4E194B5DEFD1F8B30B6147A3
File Size:
48.64 KB, 48640 bytes
|
|
MD5:
490c79e8725f9dfc167d217f1049bb6e
SHA1:
84bad32c6b44369739fee95c09f5c65bb406abe0
SHA256:
61DD89C4280BA3B138D51F3B36732E4CF61D9C9810FE3C3CA0A1731FD9D8E80C
File Size:
165.74 KB, 165736 bytes
|
|
MD5:
7189a32af9a65714975ce1173149bdd0
SHA1:
9f51722877b52840ca94e6385edf5cdf576d7239
SHA256:
2D4EA033D1315796BFF297D47F5EC8697CCD290AE64902E627FB305D7FC2E3A9
File Size:
166.65 KB, 166648 bytes
|
|
MD5:
c1c424b067eb75a2ac1253718a8872dc
SHA1:
57b18ebf961237cdb8c2e83895933513c519f5be
SHA256:
11F1540E950D974AE3FD093725084101154D31E2208BFF3AFD971CB89564918F
File Size:
413.38 KB, 413376 bytes
|
|
MD5:
210adf17c06df7d8abe17f5f748f170e
SHA1:
bc3bbcdb0ae9e55f1e95d1546dec71ad6fa84fac
SHA256:
D357CD643492F330CB7197463A7EB06EC973F6BBA39FC05739E89F930551D71C
File Size:
430.93 KB, 430928 bytes
|
|
MD5:
6c798773006b38a583b7d19ca428f6af
SHA1:
c9674039551bdcbd8b35b8a25337aa7a7ef7cfd3
SHA256:
1DAC26F7C672403A3A8158670AED42FFC7734816AD2746EEDBBE9891FEF33754
File Size:
430.89 KB, 430888 bytes
|
|
MD5:
73d68587f907da59cc57957df7bd0c73
SHA1:
11575c9383a99e48641bd823ab8012c5fb80d281
SHA256:
17FC79BD45A7AB502A8AE1F8B76A08CA3181BF17A91557C9BB891875917871A4
File Size:
225.43 KB, 225432 bytes
|
|
MD5:
f596d9d50049463a736668945ab50235
SHA1:
70d1d67c1f0a2d5a120eb07a3bc16cfd3efd178e
SHA256:
E2E78DBE3B40672C12403C25BEB49BF1EE83012462AF571A3E8BF4D3064C8F82
File Size:
413.30 KB, 413304 bytes
|
|
MD5:
a980a9eb7d725e139655101346eb8eb1
SHA1:
d8cd42a71e62e2a1b8dac57ba9f86a2f9b1fccd5
SHA256:
F001BB28F270BDE6947A7627D20CD21B02011793728CF4D1B53FBE8F59F30AEC
File Size:
167.53 KB, 167528 bytes
|
|
MD5:
ab5a2dace2136c0ac08bf6b833a9d45f
SHA1:
cc191d706f90d16886ec19806f4454b22d2b41f9
SHA256:
AD547780E31185348CD3F6E0E5028E31BA75979B0DE1CCB522CA0ADC353199B7
File Size:
430.56 KB, 430560 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Comments | This installation was built with Inno Setup. |
| Company Name |
|
| File Description |
|
| File Version |
|
| Legal Copyright | Somoto Ltd. |
| Product Name |
|
| Product Version | 4.3.0 |
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Site on Spot Limited | AddTrust External CA Root | Root Not Trusted |
| Somoto Ltd. | AddTrust External CA Root | Root Not Trusted |
| Somoto Ltd. | AddTrust External CA Root | Hash Mismatch |
| Site on Spot Limited | Site on Spot Limited | Self Signed |
| Somoto Ltd | VeriSign Class 3 Public Primary Certification Authority - G5 | Root Not Trusted |
Show More
| SITE ON SPOT Ltd. | thawte Primary Root CA | Root Not Trusted |
| Somoto Ltd. | thawte Primary Root CA | Root Not Trusted |
File Traits
- Installer Manifest
- nosig nsis
- x86
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\biclient.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\biclient.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\config.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\config.ini | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\getcountry | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\installquit | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\is-70tm1.tmp\741cd1617ca732a9557aae6adc94b09ed834a528_0002369795.tmp | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\is-8a7vu.tmp\97763e6a25238b6096fe4850b26c199af0266e91_0004783892.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa4cd5.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsa4cd5.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa4cd5.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsa4cd5.tmp\killprocdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa4cd5.tmp\killprocdll.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ec.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\install53337.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\install53337.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa3ed.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsc2e18.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsca833.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsca833.tmp\fri594.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca833.tmp\fri594.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsca833.tmp\fri594.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsca833.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca833.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsd2e1.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nse5645.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsec05d.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsec05d.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsf59ea.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsf59ea.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsf59ea.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsff6e1.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsff6e2.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsff6e2.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsff6e2.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsh6a02.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\3di706esz46x | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\3di706esz46x | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\bqeu1pj52d9pqz6f5p | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\bqeu1pj52d9pqz6f5p | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\dcryptdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\dcryptdll.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\lzma.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\lzma.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\xcay2u447eu | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nshe9c1.tmp\xcay2u447eu | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsi9d44.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsi9d45.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsica6e.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsla3dd.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsn6278.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn6278.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn6278.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn6a70.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsna832.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nso7ef4.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nso7ef5.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\setupcl.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nso7ef5.tmp\setupcl.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\install48818.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\install48818.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsoba3.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsoc04c.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsq59da.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsqa3fd.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsqa3fd.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsqa3fd.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsra757.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsra758.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\install25064.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\install25064.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsra758.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss2e19.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss2e19.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss2e19.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss2e19.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nss2e19.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nss4ad0.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nss69f2.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nst2f2.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nst5646.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst5646.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst5646.tmp\install48553.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nst5646.tmp\install48553.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nst5646.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstc221.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nstc222.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\setupcl.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nstc222.tmp\setupcl.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f0.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsu74f1.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\7za.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\7za.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\7za.exe_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\[random_string].7z | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\[random_string].7z | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\[random_string].7z_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\install52427.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\install52427.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsu74f1.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx4a05.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsx6267.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsx6a5f.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsxca7e.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsyb92.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\uninstallcomplete | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\xx.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\downloads | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Jerbuoiw\AppData\Local\Temp\biclient.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 鍎ꄮ๙ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Jkquqjyg\AppData\Local\Temp\biclient.exe | RegNtPreCreateKey |
Show More
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | Ꮥ䩶⽻ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Kkegjcwd\AppData\Local\Temp\nseC05D.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Unenjolo\AppData\Local\Temp\biclient.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 碑䕱ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ldivzwzj\AppData\Local\Temp\nsu74F1.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 繨ᓸ䥄ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Mdoonnlr\AppData\Local\Temp\nshE9C1.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 儨ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Yqojxlgl\AppData\Local\Temp\nsoBA3.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 万㓑斺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Windows\SystemTemp\a9dd6c3f-d641-4292-855a-e9c09c1b694b.tmp \??\C:\Windows\SystemTemp\85968c61-a19d-4e7b-a80f-d2a1fc3c08 | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 兯棐ǜ | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\internet explorer\abouturls::tabs | res://ieframe.dll/tabswelcome.htm | RegNtPreCreateKey |
| HKLM\software\wow6432node\microsoft\windows\currentversion\runonce::facesmooch-uninstall | http://www.bigseekpro.com/u_end | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 鯥 ȁ 獖} 偫~ 엦1d ᵂċ ᵆċ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Windows\SystemTemp\77e37ce0-8214-4414-aced-551c5ae204d7.tmp \??\C:\Windows\SystemTemp\e28eadcf-6ab0-4d8c-8821-7ce9a6aba1 | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\sandbox_live\tmp\111818\4884\c\users\user\appdata\local\temp\biclient.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\sandbox_live\tmp\111909\7588\c\users\user\appdata\local\temp\biclient.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ᔟ쓚申ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352 *1\??\C:\P | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 㴘揿睘ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 洍诠筈ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䜻ც箄ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ﻫ萴艦ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 엂篺郇ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| User Data Access |
|
| Encryption Used |
|
| Syscall Use |
Show More
58 additional items are not displayed above. |
| Anti Debug |
|
| Process Terminate |
|
| Network Wininet |
|
| Other Suspicious |
|
| Network Info Queried |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Uawsxdls\AppData\Local\Temp\is-8A7VU.tmp\97763e6a25238b6096fe4850b26c199af0266e91_0004783892.tmp" /SL5="$40216,4295122,153600,c:\users\user\downloads\97763e6a25238b6096fe4850b26c199af0266e91_0004783892.exe"
|
"C:\Users\Jerbuoiw\AppData\Local\Temp\biclient.exe" /url bi.bisrv.com /affid "awfr7zip19788" /id "7zip" /name "7-Zip" /browser ff
|
WMIC csproduct Get UUID /FORMAT:textvaluelist.xsl
|
WMIC bios Get SerialNumber /FORMAT:textvaluelist.xsl
|
WMIC bios Get Version /FORMAT:textvaluelist.xsl
|
Show More
WMIC csproduct Get Name /FORMAT:textvaluelist.xsl
|
7za.exe e -y -p"cc16e12b7c77b8f1fd959c415ad6f1e7" [RANDOM_STRING].7z
|
"C:\Users\Tvkaelgj\AppData\Local\Temp\is-70TM1.tmp\741cd1617ca732a9557aae6adc94b09ed834a528_0002369795.tmp" /SL5="$20146,2038800,132096,c:\users\user\downloads\741cd1617ca732a9557aae6adc94b09ed834a528_0002369795"
|
7za.exe e -y -p"e5584e65b7e50868783c408054621eb6" [RANDOM_STRING].7z
|
"C:\Users\Jkquqjyg\AppData\Local\Temp\biclient.exe" /initurl http://bi.bisrv.com/:affid:/:sid:/:uid:? /affid "oneonlinegames" /id "f1pinballzipjkdw" /name "f1-pinball.zip" /uniqid 772f121128a1196fb3a0902685bd2c3ce977df47_0000163528
|
7za.exe e -y -p"439603f41bcb401021ee148cf7769f1c" [RANDOM_STRING].7z
|
"C:\Users\Kkegjcwd\AppData\Local\Temp\nseC05D.tmp\setupcl.exe" /initurl http://sub.ginaul.info/init/7e967b2ac7d5c358275ada39ad23d5cb9aa4337c_0000413264/:uid:? /affid "-" /id "0" /name " " /uniqid 7e967b2ac7d5c358275ada39ad23d5cb9aa4337c_0000413264 /uuid /biosserial /biosversion /csname
|
"C:\Users\Unenjolo\AppData\Local\Temp\biclient.exe" /url bi.bisrv.com /affid "awplfreezip71908" /id "freezipuyiv" /name "Free Zip" /uniqid 1daefe7b77508ca24e22f2062d1765842b47ae93_0000166600 /browser ff
|
7za.exe e -y -p"f412f82a5f1cd93b46abdabe00ecb510" [RANDOM_STRING].7z
|
7za.exe e -y -p"2eab8c80e8a5782cfccc9f26bea533a9" [RANDOM_STRING].7z
|
"C:\Users\Mdoonnlr\AppData\Local\Temp\nshE9C1.tmp\lzma.exe" "d" "C:\Users\Mdoonnlr\AppData\Local\Temp\nshE9C1.tmp\bqeu1pj52d9pqz6f5p" "C:\Users\Mdoonnlr\AppData\Local\Temp\nshE9C1.tmp\biSetup56841.exe"
|
7za.exe e -y -p"3e17b05abcee4f17c87b1ff4058e061b" [RANDOM_STRING].7z
|
7za.exe e -y -p"be1bf6fa5de8fb8fcca12a9d66238c22" [RANDOM_STRING].7z
|
"C:\Users\Igxtfuqp\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"c:\users\user\downloads\update_checker.exe" /disable
|
C:\WINDOWS\system32\regsvr32 -u /s "c:\users\user\downloads\tbcore3.dll"
|
open C:\WINDOWS\system32\taskkill /F /IM TbHelper2.exe
|
WriteConsole: ERROR: The proce
|
"C:\Users\Xauudzeq\AppData\Local\Temp\biclient.exe" /initurl http://bi.bisrv.com/:affid:/:sid:/:uid:? /affid "network_web3_1" /id "flvplayerorun" /name "FLV Player" /uniqid 84bad32c6b44369739fee95c09f5c65bb406abe0_0000165736
|
"C:\Users\Xnhonaci\AppData\Local\Temp\biclient.exe" /url bi.bisrv.com /affid "piratebaymirror" /id "adobephotoshopcs5fulltuto" /name "Adobe Photoshop CS5 Full Tuto" /uniqid 9f51722877b52840ca94e6385edf5cdf576d7239_0000166648
|
7za.exe e -y -p"e32e41ab4100dbfa381c34147d218c32" [RANDOM_STRING].7z
|
"C:\Users\Usjjhwgd\AppData\Local\Temp\nso7EF5.tmp\setupcl.exe" /initurl http://sub.ineedyoutoseewhoiam.com/init/57b18ebf961237cdb8c2e83895933513c519f5be_0000413376/:uid:? /affid "-" /id "0" /name " " /uniqid 57b18ebf961237cdb8c2e83895933513c519f5be_0000413376 /uuid /biosserial /biosversion /csname
|
7za.exe e -y -p"a6533e0c496d1dc546a4a166550a9e78" [RANDOM_STRING].7z
|
7za.exe e -y -p"8356858b5b8c00899259b2bdb8738dae" [RANDOM_STRING].7z
|
Fri594.exe -y -p"60c232487ce10dfdc24e885155224a99"
|
"C:\Users\Veduunjr\AppData\Local\Temp\nscA833.tmp\setupcl.exe" /initurl http://sub.hereon.info/init/11575c9383a99e48641bd823ab8012c5fb80d281_0000225432/:uid:? /affid "-" /id "0" /name " " /uniqid 11575c9383a99e48641bd823ab8012c5fb80d281_0000225432 /uuid /biosserial /biosversion /csname
|
7za.exe e -y -p"6710f9307edc7adad3dcdf8476078f55" [RANDOM_STRING].7z
|
"C:\Users\Yxdhyzeq\AppData\Local\Temp\nstC222.tmp\setupcl.exe" /initurl http://sub.rhionx.info/init/70d1d67c1f0a2d5a120eb07a3bc16cfd3efd178e_0000413304/:uid:? /affid "-" /id "0" /name " " /uniqid 70d1d67c1f0a2d5a120eb07a3bc16cfd3efd178e_0000413304 /uuid /biosserial /biosversion /csname
|
wmic bios get serialnumber
|
7za.exe e -y -p"61c3811f51c7ef2cca3cfa2e6437e545" [RANDOM_STRING].7z
|