30f5408v6.exe

Yu Bao

The executable 30f5408v6.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from dgkytklfjrqkb.cloudfront.net. While running, it connects to the Internet address server-54-192-129-141.ams50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yu Bao  (signed and verified)

MD5:
7605942ad1f8db8f35b4e0d3c94209e7

SHA-1:
02a0a61401d7018beb00d82ff2b8060c22860e4b

SHA-256:
b95021018b746337048c6969669f5ed9ddc3da84b408484936114d2eec19ba33

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/24/2024 6:39:15 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.2.16

File size:
422.4 KB (432,576 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\30f5408v6.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/21/2017 3:00:00 AM

Valid to:
11/22/2017 2:59:59 AM

Subject:
CN=Yu Bao, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
708C988F093CFAE968FE5525CA048ABA

File PE Metadata
Compilation timestamp:
1/19/2017 4:10:23 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x1062

Entry point:
E8, 2C, 3E, 00, 00, E9, 45, CD, 00, 00, E9, 9F, 71, 00, 00, 55, 8B, EC, 6A, 00, FF, 75, 18, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, AB, 24, 00, 00, 83, C4, 18, 5D, C3, 55, 8B, EC, FF, 75, 08, E8, 4B, 7D, 00, 00, 59, FF, 75, 08, FF, 15, 5C, 00, 46, 00, CC, 55, 8B, EC, 8B, 45, 08, 8B, 00, 81, 38, 52, 43, 43, E0, 74, 21, 81, 38, 4D, 4F, 43, E0, 74, 19, 81, 38, 63, 73, 6D, E0, 75, 2A, E8, 2B, 40, 00, 00, 83, A0, 90, 00, 00, 00, 00, E9, 3A, 20, 00, 00, E8, 1A, 40, 00, 00, 83, B8, 90, 00, 00, 00, 00...
 
[+]

Code size:
378 KB (387,072 bytes)

The file 30f5408v6.exe has been seen being distributed by the following URL.

http://dgkytklfjrqkb.cloudfront.net/.../yomz.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-129-141.ams50.r.cloudfront.net  (54.192.129.141:80)

TCP (HTTP):
Connects to server-54-230-163-252.jax1.r.cloudfront.net  (54.230.163.252:80)

TCP (HTTP):
Connects to server-54-230-141-55.sfo5.r.cloudfront.net  (54.230.141.55:80)

TCP (HTTP):
Connects to server-54-230-141-182.sfo5.r.cloudfront.net  (54.230.141.182:80)

TCP (HTTP):
Connects to server-54-230-141-119.sfo5.r.cloudfront.net  (54.230.141.119:80)

TCP (HTTP):
Connects to server-54-192-129-17.ams50.r.cloudfront.net  (54.192.129.17:80)

TCP (HTTP):
Connects to server-54-192-129-100.ams50.r.cloudfront.net  (54.192.129.100:80)

Remove 30f5408v6.exe - Powered by Reason Core Security