Your Peace of Mind is our Commitment

Contact Us English Recent Articles

November Honeypot Report

First published: 10th December 2013

This is the twenty-second monthly report from West Coast Labs's honeypot in Hong Kong, providing some indication of the type and level of malware threat in Hong Kong, but it is only based on a single honeypot, so the conclusions should be treated with caution. The number of attacks has increased slightly.

Average Time To Infect: 37 hours 12 minutes

The average time to infect is an indication of how long it would be before a vulnerable computer connected to the internet in Hong Kong became infected.

Summary

Source of Attacks

The following breaks down where these attacks have come from by use of IP geolocation.

4Macedonia
4United States
2Bosnia
2Canada
2Italy
1China
1Czech Republic
1Indonesia
1Russia
1South Korea
1Thailand

Malware

Checksum (md5)This monthPrevious countDetection*
3875b6257d4d21d51ec13247ee4c1cdb 2 55W32Rbot!I2663.exe ,Backdoor.Win32.Rbot.bni ,W32/Malware!44f4 W32/Sdbot.AEFV ,
64b4345a946bc9388412fedd53fb21cf 2 2,UDS:DangerousObject.Multi.Generic Email-Worm.Win32.Updater.k Email-Worm.Win32.Updater.n ,w32/trojan-sml-sdcw!eldorado ,
c1989130056c32fa305e3de57f6f40f1 1 2,Backdoor.Win32.Rbot.bni Virus.Win32.Virut.n ,W32/Trojan.MEX ,
6527ce860cd40ceda4e2a81782d46c2c 1 1,Backdoor.Win32.Rbot.adqd ,W32/Sdbot.AEFV ,
a650c67e14cfb27879999036741478d5 1 1,backdoor.win32.ircbot.jwy ,w32/backdoor2.dstk ,
0d4d64321a77e17c1637ef3b30290b31 1 0,net-worm.win32.allaple.e ,w32/emailworm.hqk ,
952098cf3c65cfcb52282d8959ddffd3 1 9,Net-Worm.Win32.Allaple.e Trojan.Win32.Genome.rioo ,W32/Allaple.H ,
741b9ecd6367ac9cbba5613cedaf53ea 1 0,,, script file
c0276991baff7a50b6f774d7055c440b 1 1,Net-Worm.Win32.Allaple.e Virus.Win32.Virut.n ,W32/Allaple.H ,
514ffff11e40ad60e1f58aa3f53facb7 1 0,net-worm.win32.allaple.e ,w32/allaple.a.gen!eldorado ,
93b587a0f0652b17ed82846c83ef4aa5 1 0,Backdoor.Win32.Rbot.adqd ,w32/virut.ag ,
b0599b847e5df4109e7a0e4ad883e00e 1 1 ,Virus.Win32.Virut.at Net-Worm.Win32.Allaple.e ,W32/Virut.AG ,
8d9a4ff99fcb614b99d572e06a2a3d1a 1 1,Backdoor.Win32.Rbot.adqd ,w32/sdbot.aefv w32/virut.7205 ,
c4f15c18c89c10df6fe5e01a2b678b3b 1 0,Backdoor.Win32.Rbot.bni ,w32/rbot.b.gen!eldorado ,
a20d698fd1ff4c80dfc8096bfdd1f2ba 1 0,net-worm.win32.allaple.e ,w32/emailworm.hqk ,
ac8a744e25af311cf1d07f2ca23306e2 1 0,,, script file
3608f0fa72c8a01f39311511658b0d18 1 0,virus.win32.virut.at net-worm.win32.allaple.e ,w32/virut.ag ,
2f6d1fbc05d0166c8f69242e8435dae7 1 0,net-worm.win32.allaple.e ,w32/allaple.a.gen!eldorado ,

The parameter 'Detection' here relates to whether one or more scanners was able to associate a name with this checksum.

Where an X is shown under Previous, the file has been seen before in this honeypot but the relevant logs are not available.


More Information