PLATINUM
Image Description
Common Information
Type Value
UUID d7b4b9fd-c80e-49a5-b7f4-cfa85ba1d8e0
Fingerprint b7f981cf5356ad67309902bbc27317650c3211e38f52e75e03105da4b6e582cb
Analysis status DONE
Considered CTI value 2
Text language
Published April 26, 2016, 2:24 p.m.
Added to db March 10, 2024, 12:28 a.m.
Last updated Oct. 1, 2024, 2:58 p.m.
Headline PLATINUM
Title PLATINUM
Detected Hints/Tags/Attributes 155/3/126
Attributes
Details Type #Events CTI Value
Details CVE 30
cve-2015-2545
Details CVE 11
cve-2013-7331
Details CVE 4
cve-2013-1331
Details CVE 7
cve-2015-2546
Details Domain 1
mister.nofrillspace.com
Details Domain 1
intent.nofrillspace.com
Details Domain 1
www.police28122011.0fees.net
Details Domain 1
box62.a-inet.net
Details Domain 1
eclipse.a-inet.net
Details Domain 1
joomlastats.a-inet.net
Details Domain 1
updates.joomlastats.co.cc
Details Domain 1
server.joomlastats.co.cc
Details Domain 1
scienceweek.scieron.com
Details Domain 1
mobileworld.darktech.org
Details Domain 1
geocities.efnet.at
Details Domain 1
bpl.blogsite.org
Details Domain 1
wiki.servebbs.net
Details Domain 5
www.yumpu.com
Details Domain 5
plusvic.github.io
Details File 1
bogor.doc
Details File 1
president.doc
Details File 2
ops.doc
Details File 3
2011.doc
Details File 1
fun.doc
Details File 1
ii.doc
Details File 1
space.gif
Details File 1
mao_2011.doc
Details File 1
indonesia.doc
Details File 1
devices.doc
Details File 1
semboyan_1.doc
Details File 1
pp4x322.dll
Details File 8
resume.docx
Details File 2130
cmd.exe
Details File 1
pk2.exe
Details File 33
360tray.exe
Details File 42
bdagent.exe
Details File 1
proguard.exe
Details File 9
blackd.exe
Details File 7
blackice.exe
Details File 25
savservice.exe
Details File 119
avp.exe
Details File 11
rstray.exe
Details File 1
cmccore.exe
Details File 2
cmctrayicon.exe
Details File 36
zhudongfangyu.exe
Details File 478
lsass.exe
Details File 14
cacls.exe
Details File 212
winlogon.exe
Details File 1122
svchost.exe
Details File 2
mstbl.dll
Details File 2
fgrps.dll
Details File 2
c:\program files\windows journal\templates\cpl\jnwmon.exe
Details sha1 1
e9f900b5d01320ccd4990fd322a459d709d43e4b
Details sha1 1
9a4e82ba371cd2fedea0b889c879daee7a01e1b1
Details sha1 1
92a3ece981bb5e0a3ee4277f08236c1d38b54053
Details sha1 1
0bc08dca86bd95f43ccc78ef4b27d81f28b4b769
Details sha1 1
f4af574124e9020ef3d0a7be9f1e42c2261e97e6
Details sha1 1
1bdc1a0bc995c1beb363b11b71c14324be8577c9
Details sha1 1
2a33542038a85db4911d7b846573f6b251e16b2d
Details sha1 1
d6a795e839f51c1a5aeabf5c10664936ebbef8ea
Details sha1 1
f362feedc046899a78c4480c32dda4ea82a3e8c0
Details sha1 1
f751cdfaef99c6184f45a563f3d81ff1ada25565
Details sha1 1
ff7f949da665ba8ce9fb01da357b51415634eaad
Details sha1 1
dff2fee984ba9f5a8f5d97582c83fca4fa1fe131
Details sha1 1
e0ac2ae221328313a7eee33e9be0924c46e2beb9
Details sha1 1
ccaf36c2d02c3c5ca24eeeb7b1eae7742a23a86a
Details sha1 1
ca3bda30a3cdc15afb78e54fa1bbb9300d268d66
Details sha1 1
2fe3c80e98bbb0cf5a0c4da286cd48ec78130a24
Details sha1 1
09e0dfbb5543c708c0dd6a89fd22bbb96dc4ca1c
Details sha1 1
0096a3e0c97b85ca75164f48230ae530c94a2b77
Details sha1 1
6a1412daaa9bdc553689537df0a004d44f8a45fd
Details sha1 1
d3ad0933e1b114b14c2b3a2c59d7f8a95ea0bcbd
Details sha1 1
a80051d5ae124fd9e5cc03e699dd91c2b373978b
Details sha1 1
fa087986697e4117c394c9a58cb9f316b2d9f7d8
Details sha1 1
29cb81dbe491143b2f8b67beaeae6557d8944ab4
Details sha1 1
48b89f61d58b57dba6a0ca857bce97bab636af65
Details sha1 1
6dccf88d89ad7b8611b1bc2e9fb8baea41bdb65a
Details sha1 1
3907a9e41df805f912f821a47031164b6636bd04
Details sha1 1
960feeb15a0939ec0b53dcb6815adbf7ac1e7bb2
Details sha1 1
99c08d31af211a0e17f92dd312ec7ca2b9469ecb
Details sha1 1
dcb6cf7cf7c8fdfc89656a042f81136bda354ba6
Details sha1 1
99dcb148b053f4cef6df5fa1ec5d33971a58bd1e
Details sha1 1
c1c950bc6a2ad67488e675da4dfc8916831239a7
Details sha1 1
831a5a29d47ab85ee3216d4e75f18d93641a9819
Details sha1 1
e18750207ddbd939975466a0e01bd84e75327dda
Details sha1 1
3119de80088c52bd8097394092847cd984606c88
Details sha1 1
3acb8fe2a5eb3478b4553907a571b6614eb5455c
Details sha1 1
6d1169775a552230302131f9385135d385efd166
Details sha1 1
bf944eb70a382bd77ee5b47548ea9a4969de0527
Details sha1 1
d807648ddecc4572c7b04405f496d25700e0be6e
Details sha1 1
1b542dd0dacfcd4200879221709f5fa9683cdcda
Details sha1 1
bbd4992ee3f3a3267732151636359cf94fb4575d
Details sha1 1
3d17828632e8ff1560f6094703ece5433bc69586
Details sha1 1
2abb8e1e9cac24be474e4955c63108ff86d1a034
Details sha1 1
fa083d744d278c6f4865f095cfd2feabee558056
Details sha1 1
3a678b5c9c46b5b87bfcb18306ed50fadfc6372e
Details sha1 1
3f2ce812c38ff5ac3d813394291a5867e2cddcf2
Details sha1 1
88ff852b1b8077ad5a19cc438afb2402462fbd1a
Details sha1 1
2155c20483528377b5e3fde004bb604198463d29
Details sha1 1
dc991ef598825daabd9e70bac92c79154363bab2
Details IPv4 1
200.61.248.8
Details IPv4 1
209.45.65.163
Details IPv4 1
190.96.47.9
Details IPv4 1
192.192.114.1
Details IPv4 1
61.31.203.98
Details Url 1
https://www.yumpu.com/en/document/view/14255220/alexsyscan13/23.
Details Url 1
https://plusvic.github.io/yara
Details Yara rule 1
rule Trojan_Win32_Platual : Platinum {
	meta:
		author = "Microsoft"
		description = "Installer component"
		original_sample_sha1 = "e0ac2ae221328313a7eee33e9be0924c46e2beb9"
		unpacked_sample_sha1 = "ccaf36c2d02c3c5ca24eeeb7b1eae7742a23a86a"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$class_name = "AVCObfuscation"
		$scrambled_dir = { A8 8B B8 E3 B1 D7 FE 85 51 32 3E C0 F1 B7 73 99 }
	condition:
		$class_name and $scrambled_dir
}
Details Yara rule 1
rule Trojan_Win32_Plaplex : Platinum {
	meta:
		author = "Microsoft"
		description = "Variant of the JPin backdoor"
		original_sample_sha1 = "ca3bda30a3cdc15afb78e54fa1bbb9300d268d66"
		unpacked_sample_sha1 = "2fe3c80e98bbb0cf5a0c4da286cd48ec78130a24"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$class_name1 = "AVCObfuscation"
		$class_name2 = "AVCSetiriControl"
	condition:
		$class_name1 and $class_name2
}
Details Yara rule 1
rule Trojan_Win32_Dipsind_B : Platinum {
	meta:
		author = "Microsoft"
		description = "Dipsind Family"
		sample_sha1 = "09e0dfbb5543c708c0dd6a89fd22bbb96dc4ca1c"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$frg1 = { 8D 90 04 01 00 00 33 C0 F2 AE F7 D1 2B F9 8B C1 8B F7 8B FA C1 E9 02 F3 A5 8B C8 83 E1 03 F3 A4 8B 4D EC 8B 15 ?? ?? ?? ?? 89 91 ?? 07 00 00 }
		$frg2 = { 68 A1 86 01 00 C1 E9 02 F3 AB 8B CA 83 E1 03 F3 AA }
		$frg3 = { C0 E8 07 D0 E1 0A C1 8A C8 32 D0 C0 E9 07 D0 E0 0A C8 32 CA 80 F1 63 }
	condition:
		$frg1 and $frg2 and $frg3
}
Details Yara rule 1
rule Trojan_Win32_PlaKeylog_B : Platinum {
	meta:
		author = "Microsoft"
		description = "Keylogger component"
		original_sample_sha1 = "0096a3e0c97b85ca75164f48230ae530c94a2b77"
		unpacked_sample_sha1 = "6a1412daaa9bdc553689537df0a004d44f8a45fd"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$hook = { C6 06 FF 46 C6 06 25 }
		$dasm_engine = { 80 C9 10 88 0E 8A CA 80 E1 07 43 88 56 03 80 F9 05 }
	condition:
		$hook and $dasm_engine
}
Details Yara rule 1
rule Trojan_Win32_Adupib : Platinum {
	meta:
		author = "Microsoft"
		description = "Adupib SSL Backdoor"
		original_sample_sha1 = "d3ad0933e1b114b14c2b3a2c59d7f8a95ea0bcbd"
		unpacked_sample_sha1 = "a80051d5ae124fd9e5cc03e699dd91c2b373978b"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "POLL_RATE"
		$str2 = "OP_TIME(end hour)"
		$str3 = "%d:TCP:*:Enabled"
		$str4 = "%s[PwFF_cfg%d]"
		$str5 = "Fake_GetDlgItemTextW: ***value***="
	condition:
		$str1 and $str2 and $str3 and $str4 and $str5
}
Details Yara rule 1
rule Trojan_Win32_PlaLsaLog : Platinum {
	meta:
		author = "Microsoft"
		description = "Loader / possible incomplete LSA Password Filter"
		original_sample_sha1 = "fa087986697e4117c394c9a58cb9f316b2d9f7d8"
		unpacked_sample_sha1 = "29cb81dbe491143b2f8b67beaeae6557d8944ab4"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { 8A 1C 01 32 DA 88 1C 01 8B 74 24 0C 41 3B CE 7C EF 5B 5F C6 04 01 00 5E 81 C4 04 01 00 00 C3 }
		$str2 = "PasswordChangeNotify"
	condition:
		$str1 and $str2
}
Details Yara rule 1
rule Trojan_Win32_Plagon : Platinum {
	meta:
		author = "Microsoft"
		description = "Dipsind variant"
		original_sample_sha1 = "48b89f61d58b57dba6a0ca857bce97bab636af65"
		unpacked_sample_sha1 = "6dccf88d89ad7b8611b1bc2e9fb8baea41bdb65a"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "VPLRXZHTU"
		$str2 = { 64 6F 67 32 6A 7E 6C }
		$str3 = "Dqpqftk(Wou\"Isztk)"
		$str4 = "StartThreadAtWinLogon"
	condition:
		$str1 and $str2 and $str3 and $str4
}
Details Yara rule 1
rule Trojan_Win32_Plakelog : Platinum {
	meta:
		author = "Microsoft"
		description = "Raw-input based keylogger"
		original_sample_sha1 = "3907a9e41df805f912f821a47031164b6636bd04"
		unpacked_sample_sha1 = "960feeb15a0939ec0b53dcb6815adbf7ac1e7bb2"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "<0x02>" wide
		$str2 = "[CTR-BRK]" wide
		$str3 = "[/WIN]" wide
		$str4 = { 8A 16 8A 18 32 DA 46 88 18 8B 15 08 E6 42 00 40 41 3B CA 72 EB 5E 5B }
	condition:
		$str1 and $str2 and $str3 and $str4
}
Details Yara rule 1
rule Trojan_Win32_Plainst : Platinum {
	meta:
		author = "Microsoft"
		description = "Installer component"
		original_sample_sha1 = "99c08d31af211a0e17f92dd312ec7ca2b9469ecb"
		unpacked_sample_sha1 = "dcb6cf7cf7c8fdfc89656a042f81136bda354ba6"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { 66 8B 14 4D 18 50 01 10 8B 45 08 66 33 14 70 46 66 89 54 77 FE 66 83 7C 77 FE 00 75 B7 8B 4D FC 89 41 08 8D 04 36 89 41 0C 89 79 04 }
		$str2 = { 4B D3 91 49 A1 80 91 42 83 B6 33 28 36 6B 90 97 }
	condition:
		$str1 and $str2
}
Details Yara rule 1
rule Trojan_Win32_Plagicom : Platinum {
	meta:
		author = "Microsoft"
		description = "Installer component"
		original_sample_sha1 = "99dcb148b053f4cef6df5fa1ec5d33971a58bd1e"
		unpacked_sample_sha1 = "c1c950bc6a2ad67488e675da4dfc8916831239a7"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { C6 44 24 ?? 68 C6 44 24 ?? 4D C6 44 24 ?? 53 C6 44 24 ?? 56 C6 44 24 ?? 00 }
		$str2 = "OUEMM/EMM"
		$str3 = { 85 C9 7E 08 FE 0C 10 40 3B C1 7C F8 C3 }
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Plaklog : Platinum {
	meta:
		author = "Microsoft"
		description = "Hook-based keylogger"
		original_sample_sha1 = "831a5a29d47ab85ee3216d4e75f18d93641a9819"
		unpacked_sample_sha1 = "e18750207ddbd939975466a0e01bd84e75327dda"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "++[%s^^unknown^^%s]++"
		$str2 = "vtfs43/emm"
		$str3 = { 33 C9 39 4C 24 08 7E 10 8B 44 24 04 03 C1 80 00 08 41 3B 4C 24 08 7C F0 C3 }
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Plapiio : Platinum {
	meta:
		author = "Microsoft"
		description = "JPin backdoor"
		original_sample_sha1 = "3119de80088c52bd8097394092847cd984606c88"
		unpacked_sample_sha1 = "3acb8fe2a5eb3478b4553907a571b6614eb5455c"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "ServiceMain"
		$str2 = "Startup"
		$str3 = { C6 45 ?? 68 C6 45 ?? 4D C6 45 ?? 53 C6 45 ?? 56 C6 45 ?? 6D C6 45 ?? 6D }
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Plabit : Platinum {
	meta:
		author = "Microsoft"
		description = "Installer component"
		sample_sha1 = "6d1169775a552230302131f9385135d385efd166"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { 4B D3 91 49 A1 80 91 42 83 B6 33 28 36 6B 90 97 }
		$str2 = "GetInstanceW"
		$str3 = { 8B D0 83 E2 1F 8A 14 0A 30 14 30 40 3B 44 24 04 72 EE }
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Placisc2 : Platinum {
	meta:
		author = "Microsoft"
		description = "Dipsind variant"
		original_sample_sha1 = "bf944eb70a382bd77ee5b47548ea9a4969de0527"
		unpacked_sample_sha1 = "d807648ddecc4572c7b04405f496d25700e0be6e"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { 76 16 8B D0 83 E2 07 8A 4C 14 24 8A 14 18 32 D1 88 14 18 40 3B C7 72 EA }
		$str2 = "VPLRXZHTU"
		$str3 = "%d) Command:%s"
		$str4 = { 0D 0A 2D 2D 2D 2D 2D 09 2D 2D 2D 2D 2D 2D 0D 0A }
	condition:
		$str1 and $str2 and $str3 and $str4
}
Details Yara rule 1
rule Trojan_Win32_Placisc3 : Platinum {
	meta:
		author = "Microsoft"
		description = "Dipsind variant"
		original_sample_sha1 = "1b542dd0dacfcd4200879221709f5fa9683cdcda"
		unpacked_sample_sha1 = "bbd4992ee3f3a3267732151636359cf94fb4575d"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { BA 6E 00 00 00 66 89 95 ?? ?? FF FF B8 73 00 00 00 66 89 85 ?? ?? FF FF B9 64 00 00 00 66 89 8D ?? ?? FF FF BA 65 00 00 00 66 89 95 ?? ?? FF FF B8 6C 00 00 00 }
		$str2 = "VPLRXZHTU"
		$str3 = { 8B 44 24 ?? 8A 04 01 41 32 C2 3B CF 7C F2 88 03 }
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Placisc4 : Platinum {
	meta:
		author = "Microsoft"
		description = "Installer for Dipsind variant"
		original_sample_sha1 = "3d17828632e8ff1560f6094703ece5433bc69586"
		unpacked_sample_sha1 = "2abb8e1e9cac24be474e4955c63108ff86d1a034"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = { 8D 71 01 8B C6 99 BB 0A 00 00 00 F7 FB 0F BE D2 0F BE 04 39 2B C2 88 04 39 84 C0 74 0A }
		$str2 = { 6A 04 68 00 20 00 00 68 00 00 40 00 6A 00 FF D5 }
		$str3 = { C6 44 24 ?? 64 C6 44 24 ?? 6F C6 44 24 ?? 67 C6 44 24 ?? 32 C6 44 24 ?? 6A }
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Plakpers : Platinum {
	meta:
		author = "Microsoft"
		description = "Injector / loader component"
		original_sample_sha1 = "fa083d744d278c6f4865f095cfd2feabee558056"
		unpacked_sample_sha1 = "3a678b5c9c46b5b87bfcb18306ed50fadfc6372e"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "MyFileMappingObject"
		$str2 = "[%.3u]  %s  %s  %s [%s:" wide
		$str3 = "%s\\{%s}\\%s" wide
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Plainst2 : Platinum {
	meta:
		author = "Microsoft"
		description = "Zc tool"
		original_sample_sha1 = "3f2ce812c38ff5ac3d813394291a5867e2cddcf2"
		unpacked_sample_sha1 = "88ff852b1b8077ad5a19cc438afb2402462fbd1a"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "Connected [%s:%d]..."
		$str2 = "reuse possible: %c"
		$str3 = "] => %d%%\x0a"
	condition:
		$str1 and $str2 and $str3
}
Details Yara rule 1
rule Trojan_Win32_Plakpeer : Platinum {
	meta:
		author = "Microsoft"
		description = "Zc tool v2"
		original_sample_sha1 = "2155c20483528377b5e3fde004bb604198463d29"
		unpacked_sample_sha1 = "dc991ef598825daabd9e70bac92c79154363bab2"
		activity_group = "Platinum"
		version = "1.0"
		last_modified = "2016-04-12"
	strings:
		$str1 = "@@E0020(%d)" wide
		$str2 = /exit.{0,3}@exit.{0,3}new.{0,3}query.{0,3}rcz.{0,3}scz/ wide
		$str3 = "---###---" wide
		$str4 = "---@@@---" wide
	condition:
		$str1 and $str2 and $str3 and $str4
}