SonicALERT
Search

Sonicwall Signatures

 

Go to All Categories list.


  Angler.EK1
Angler.EK1 is a Trojan. A Trojan is a program that pretends to have a valid use, but in fact modifies the user's computer in malicious ways. Trojans do not replicate or spread to other computers.

File Related Changes
It drops the following file(s) on the system:
  • "C:\Documents and Settings\Admin\Local Settings\Temp\8773.bat"
  • "C:\Documents and Settings\Admin\zifogfrw.exe"

Process Related Changes
It creates the following mutex(es):
  • ZonesCacheCounterMutex"
  • ZonesLockedCacheCounterMutex"
  • CTF.TMD.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.TimListCache.FMPDefaultS-1-5-21-1078081533-842925246-854245398-1003MUTEX.DefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Compart.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • ZoneAttributeCacheCounterMutex"
  • SHIMLIB_LOG_MUTEX"
  • ZonesCounterMutex"
  • CTF.Layouts.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.Asm.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"
  • CTF.LBES.MutexDefaultS-1-5-21-1078081533-842925246-854245398-1003"

It creates the following process(es):
  • C:\WINDOWS\system32\cmd.exe [ cmd /c \C:\DOCUME1\Admin\LOCALS1\Temp\8773.bat ]
  • C:\WINDOWS\system32\svchost.exe [ svchost.exe ]
  • C:\WINDOWS\Temp\a29acacfc2b5e44cdbfb769ce9cf9ccf.exe [ \c:\windows\temp\a29acacfc2b5e44cdbfb769ce9cf9ccf.exe ]
  • C:\Documents and Settings\Admin\zifogfrw.exe

It injects malicious code into the following process(es):
  • "C:\Documents and Settings\Admin\zifogfrw.exe"
  • "C:\WINDOWS\system32\svchost.exe"

      Registry Related Changes
      It makes the following registry modifications to ensure infection after system reboot:
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= C:\WINDOWS\system32\ESENT.dll
      • HKU\s-1-5-21-1078081533-842925246-854245398-1003\Software\Microsoft\Windows\CurrentVersion\Run\= C:\WINDOWS\system32\ESENT.dll
      • HKLM\system\CurrentControlSet\Services\eventlog\application\esent\= *** Special Characters ***
      • HKU\s-1-5-21-1078081533-842925246-854245398-1003\Software\Microsoft\Windows\CurrentVersion\Run\= *** Special Characters ***
      • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= *** Special Characters ***
      • HKLM\system\CurrentControlSet\Services\tcpip\parameters\= C:\WINDOWS\system32\ESENT.dll


      Relevant Information