4zul9sr5.exe

Sciagnij.pl

AGORA S.A.

The file 4zul9sr5.exe, “Manager pobierania Sciagnij.pl” has been detected as a potentially unwanted program by 23 anti-malware scanners. The file has been seen being downloaded from sciagnij-online.pl.
Publisher:
AGORA S.A.

Product:
Sciagnij.pl

Description:
Manager pobierania Sciagnij.pl

Version:
2.0

MD5:
85d34b7ba37100a35d131f4c15aadc33

SHA-1:
4844f6ed3d26bbf0482b2bd57a19000df30c9b3a

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
11/25/2024 1:13:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Downloader.YB
363

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Bundler
2015.10.10

Avira AntiVirus
PUA/Sciagnij.Gen
8.3.2.2

Arcabit
Application.Downloader.YB
1.0.0.582

avast!
Win32:Malware-gen
2014.9-160206

Bitdefender
Application.Downloader.YB
1.0.20.185

ESET NOD32
Win32/Sciagnij.A potentially unwanted (variant)
10.12384

Fortinet FortiGate
Riskware/Sciagnij
2/6/2016

F-Secure
Application.Downloader.YB
11.2016-06-02_7

G Data
Application.Downloader.YB
16.2.25

IKARUS anti.virus
PUA.Sciagnij
t3scan.1.9.5.0

K7 AntiVirus
Adware
13.210.17488

Kaspersky
not-a-virus:Downloader.Win32.Sciagnij
14.0.0.701

McAfee
Artemis!85D34B7BA371
5600.6497

MicroWorld eScan
Application.Downloader.YB
17.0.0.111

NANO AntiVirus
Trojan.Win32.Sciagnij.duggct
0.30.26.3947

Panda Antivirus
Trj/Genetic.gen
16.02.06.07

Sophos
Generic PUA EI (PUA)
4.98

Trend Micro
TROJ_GEN.R031C0EGM15
10.465.06

Vba32 AntiVirus
Downloader.Sciagnij
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
44418

ViRobot
Trojan.Win32.S.Agent.2222080.J[h]
2014.3.20.0

File size:
2.1 MB (2,222,080 bytes)

Copyright:
AGORA S.A.

Language:
Polish

Common path:
C:\Documents and Settings\{user}\Local settings\temp\4zul9sr5.exe.part

File PE Metadata
Compilation timestamp:
7/6/2015 2:17:33 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.21

CTPH (ssdeep):
49152:8ZO/J+FTMKIZx7u2RN4XwQ2VOLuud6LmVL2Fhkc1FPSwM:BBdJZ1jR2b2cKuExkYP

Entry address:
0x7F0A50

Entry point:
60, BE, 15, 40, 9D, 00, 8D, BE, EB, CF, A2, FF, C7, 87, F4, 1F, 7E, 00, FF, FF, 5A, 92, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
2.1 MB (2,215,936 bytes)

The file 4zul9sr5.exe has been seen being distributed by the following URL.

Remove 4zul9sr5.exe - Powered by Reason Core Security