74be16.exe

The executable 74be16.exe has been detected as malware by 31 anti-virus scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘74BE16’.
MD5:
4f359b23a10f729be3311ce139f5b596

SHA-1:
702a898db55af69bd24bf0b76c04317087d1a203

Scanner detections:
31 / 68

Status:
Malware

Analysis date:
11/30/2024 8:56:19 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Backdoor.FlyAgent
7.1.1

AhnLab V3 Security
Win32/Flystudio.worm.Gen
2012.10.15

Avira AntiVirus
TR/Dropper.Gen
7.11.46.26

avast!
Win32:EvilEPL [Cryp]
2014.9-160125

AVG
Win32/Heur
2017.0.2853

Bitdefender
GenPack:Backdoor.Generic.435547
1.0.20.125

Clam AntiVirus
Worm.FlyStudio-39
0.98/18155

Comodo Security
TrojWare.Win32.Agent.btho
13860

Emsisoft Anti-Malware
Worm.Win32.FlyStudio!IK
8.16.01.25.02

ESET NOD32
Win32/FlyStudio.NTX
10.7583

Fortinet FortiGate
W32/PckdFlyStudio.gen
1/25/2016

F-Prot
W32/Nuj.A.gen
v6.4.6.5.141

F-Secure
Trojan-Dropper:W32/Peed.gen!A
11.2016-25-01_2

G Data
GenPack:Backdoor.Generic.435547
16.1.22

IKARUS anti.virus
Worm.Win32.FlyStudio
t3scan.1.1.122.0

K7 AntiVirus
Trojan
13.153.7730

Kaspersky
Trojan-Dropper.Win32.Flystud
14.0.0.762

McAfee
W32/Autorun.worm.ev
5600.6509

Microsoft Security Essentials
Backdoor:Win32/FlyAgent.F
1.163.1557.0

MicroWorld eScan
GenPack:Backdoor.Generic.435547
17.0.0.75

nProtect
Trojan-Dropper/W32.FlyStudio.1408818
12.10.14.01

Panda Antivirus
Bck/Wutau.B
16.01.25.02

Quick Heal
Backdoor.FlyAgent.F
1.16.12.00

Rising Antivirus
Worm.Win32.Agent.aio
23.00.65.16123

Sophos
Mal/EncPk-NB
4.81

SUPERAntiSpyware
Trojan.Agent/Gen-Fly[Large]
9364

Total Defense
Win32/Nuj.OU
37.0.10117

Trend Micro House Call
WORM_FLYSTUD.AR
7.2.25

Trend Micro
WORM_FLYSTUD.AR
10.465.25

VIPRE Antivirus
Trojan.Win32.Autorun.dm
13520

ViRobot
Trojan.Win32.A.Downloader.200704.FK
2011.4.7.4223

File size:
1.3 MB (1,408,818 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Windows\System32\acf7ef\74be16.exe

File PE Metadata
Compilation timestamp:
12/25/1972 12:33:23 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
4.0

CTPH (ssdeep):
24576:aJgm76uTv0v1AM/bPzyO6aouVNkS7jujYduyUynL8OpzD8:aJyujiqMD+fsH7GyuyhngO9D8

Entry address:
0x1187

Entry point:
52, 56, 57, 50, 2B, FF, 53, 51, 0F, 84, CB, FF, FF, FF, 16, 72, 48, C6, BA, 43, 6C, CF, 81, 90, E0, 0F, 85, 98, 01, 00, 00, 0F, 82, 41, 00, 00, 00, FC, A4, 6F, AF, 39, 2A, 59, BD, EB, BE, DD, AD, E6, B2, 95, 01, AE, 45, 5A, 83, FC, 21, B4, 4A, F9, 0F, 82, D5, FF, FF, FF, C9, 28, 94, A4, A9, 70, 46, 31, 5A, 8C, A1, 53, 9D, 0E, 81, C7, 44, 49, 77, 2B, 8D, 5C, BE, 1A, AE, 6C, 71, 97, B1, 30, FC, AF, 82, B3, 83, EE, F8, E9, CC, 01, 00, 00, 9F, 10, 5A, 47, 55, 5C, A3, EF, 13, 38, 08, 0E, 09, A3, 24, E8, 35, 2F...
 
[+]

Entropy:
7.9652  (probably packed)

Code size:
24 KB (24,576 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
74BE16

Command:
C:\Windows\System32\acf7ef\74be16.exe


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ec2-52-0-217-44.compute-1.amazonaws.com  (52.0.217.44:80)

Remove 74be16.exe - Powered by Reason Core Security