3i8ghl2bz.exe

Yu Bao

The executable 3i8ghl2bz.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from dgkytklfjrqkb.cloudfront.net. While running, it connects to the Internet address server-54-192-129-206.ams50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yu Bao  (signed and verified)

MD5:
8628488128d9215adbccb20920502ba2

SHA-1:
c8a9ec39c3028c3302e7bb5b05a66628769f7e23

SHA-256:
c104970f286c6371c055b4d65f384d8827730182358f52235cb237654dc8eed5

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/24/2024 6:40:16 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.2.14

File size:
422.4 KB (432,568 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\3i8ghl2bz.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/21/2017 5:30:00 AM

Valid to:
11/22/2017 5:29:59 AM

Subject:
CN=Yu Bao, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
708C988F093CFAE968FE5525CA048ABA

File PE Metadata
Compilation timestamp:
1/19/2017 6:40:23 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x1062

Entry point:
E8, 2C, 3E, 00, 00, E9, 45, CD, 00, 00, E9, 9F, 71, 00, 00, 55, 8B, EC, 6A, 00, FF, 75, 18, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, AB, 24, 00, 00, 83, C4, 18, 5D, C3, 55, 8B, EC, FF, 75, 08, E8, 4B, 7D, 00, 00, 59, FF, 75, 08, FF, 15, 5C, 00, 46, 00, CC, 55, 8B, EC, 8B, 45, 08, 8B, 00, 81, 38, 52, 43, 43, E0, 74, 21, 81, 38, 4D, 4F, 43, E0, 74, 19, 81, 38, 63, 73, 6D, E0, 75, 2A, E8, 2B, 40, 00, 00, 83, A0, 90, 00, 00, 00, 00, E9, 3A, 20, 00, 00, E8, 1A, 40, 00, 00, 83, B8, 90, 00, 00, 00, 00...
 
[+]

Entropy:
7.8078  (probably packed)

Code size:
378 KB (387,072 bytes)

The file 3i8ghl2bz.exe has been seen being distributed by the following URL.

http://dgkytklfjrqkb.cloudfront.net/.../yomz.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-216-171.mrs50.r.cloudfront.net  (54.230.216.171:80)

TCP (HTTP):
Connects to server-54-230-216-86.mrs50.r.cloudfront.net  (54.230.216.86:80)

TCP (HTTP):
Connects to server-54-240-186-80.mad50.r.cloudfront.net  (54.240.186.80:80)

TCP (HTTP):
Connects to server-52-85-63-239.lhr50.r.cloudfront.net  (52.85.63.239:80)

TCP (HTTP):
Connects to server-54-192-129-206.ams50.r.cloudfront.net  (54.192.129.206:80)

TCP (HTTP):
Connects to server-54-192-129-94.ams50.r.cloudfront.net  (54.192.129.94:80)

TCP (HTTP):
Connects to server-52-85-83-69.lax1.r.cloudfront.net  (52.85.83.69:80)

TCP (HTTP):
Connects to server-52-85-63-194.lhr50.r.cloudfront.net  (52.85.63.194:80)

TCP (HTTP):
Connects to server-52-85-173-225.fra6.r.cloudfront.net  (52.85.173.225:80)

TCP (HTTP):
Connects to server-52-84-246-188.sfo20.r.cloudfront.net  (52.84.246.188:80)

TCP (HTTP):
Connects to server-54-240-186-148.mad50.r.cloudfront.net  (54.240.186.148:80)

TCP (HTTP):
Connects to server-54-192-129-237.ams50.r.cloudfront.net  (54.192.129.237:80)

TCP (HTTP):
Connects to server-52-85-63-64.lhr50.r.cloudfront.net  (52.85.63.64:80)

TCP (HTTP):
Connects to server-54-192-129-220.ams50.r.cloudfront.net  (54.192.129.220:80)

TCP (HTTP):
Connects to server-52-85-83-24.lax1.r.cloudfront.net  (52.85.83.24:80)

TCP (HTTP):
Connects to server-52-85-83-194.lax1.r.cloudfront.net  (52.85.83.194:80)

TCP (HTTP):
Connects to server-52-85-63-72.lhr50.r.cloudfront.net  (52.85.63.72:80)

TCP (HTTP):
Connects to server-52-85-63-4.lhr50.r.cloudfront.net  (52.85.63.4:80)

TCP (HTTP):
Connects to server-52-85-173-201.fra6.r.cloudfront.net  (52.85.173.201:80)

TCP (HTTP):
Connects to server-52-85-173-100.fra6.r.cloudfront.net  (52.85.173.100:80)

Remove 3i8ghl2bz.exe - Powered by Reason Core Security