6005c67578eb5f4e58bee998f799f484.exe

The application 6005c67578eb5f4e58bee998f799f484.exe has been detected as a potentially unwanted program by 14 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source.
MD5:
0514473c52c4ed0503d2fe0e8d1917f1

SHA-1:
173c33f24c6464196a9b912fcf4628c05a0af2a1

SHA-256:
ff264341de099d06e422e58d7f1f93e526263947456a93ef00acb8c0873b9408

Scanner detections:
14 / 68

Status:
Potentially unwanted

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Analysis date:
12/24/2024 1:15:42 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DownloadAdmin
2015.06.02

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

avast!
Win32:DownloadAdmin-H [PUP]
150525-2

AVG
Generic
2016.0.3091

Clam AntiVirus
Win.Trojan.Downloadadmin
0.98/20540

Dr.Web
Trojan.Vittalia.74
9.0.1.05190

ESET NOD32
Win32/DownloadAdmin.I potentially unwanted application
7.0.302.0

F-Prot
W32/S-b0de5e09
v6.4.7.1.166

NANO AntiVirus
Trojan.Win32.XPACK.dprfbr
0.30.24.1636

Quick Heal
PUA.Blueis.Gen
6.15.14.00

Reason Heuristics
Threat.Win.Reputation.IMP
15.6.2.6

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40552

File size:
703 KB (719,911 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\windows\temp\6005c67578eb5f4e58bee998f799f484.exe

File PE Metadata
Compilation timestamp:
1/29/2015 8:35:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:t4BS2ly9NKPRdegPsgQr/745jezvROTVo80d1WU1ntTxJ10gJ1Tvz0:thhKeiHQr/s1uRCBQWMxDp0

Entry address:
0x234A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 78, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, F8, FD, FF, FF, FF, 15, 30, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 2C, 77, 40, 00, 6A, 08, A3, 98, 3D, 42, 00, E8, DD, F9, FF, FF, 53, 68, 60, 01, 00, 00, A3, A0, 3C, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 0B, 74, 40, 00, FF, 15, 50, 71, 40, 00, 68, 00, 74, 40, 00, 68, A0, 34, 42, 00, E8, 5A, F3, FF, FF, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57...
 
[+]

Entropy:
7.7429

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to st-sh-us-dc1-002.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-240-190-28.jfk6.r.cloudfront.net  (54.240.190.28:80)

TCP (HTTP):
Connects to server-54-230-52-97.jfk6.r.cloudfront.net  (54.230.52.97:80)

TCP (HTTP):
Connects to server-54-230-52-92.jfk6.r.cloudfront.net  (54.230.52.92:80)

TCP (HTTP):
Connects to server-54-192-55-160.jfk6.r.cloudfront.net  (54.192.55.160:80)

TCP (HTTP):
Connects to server-54-192-54-80.jfk6.r.cloudfront.net  (54.192.54.80:80)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.17.72:443)

TCP (HTTP):
Connects to ns237133.ovh.net  (37.59.34.142:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):

TCP (HTTP):
Connects to a184-26-44-105.deploy.static.akamaitechnologies.com  (184.26.44.105:80)

TCP (HTTP):
Connects to 50.22.63.138-static.reverse.softlayer.com  (50.22.63.138:80)

Remove 6005c67578eb5f4e58bee998f799f484.exe - Powered by Reason Core Security