8101.tmp.exe

The executable 8101.tmp.exe has been detected as malware by 17 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘8101.tmp’. While running, it connects to the Internet address perfora.net on port 80 using the HTTP protocol.
MD5:
11dd7dc3c1b451949d04b871c6a9cf57

SHA-1:
2f56a298b4279c7373bff49d034728374bb429b0

SHA-256:
adc187470480f90e9da13592314b817158c9b30992c93abfde2186a7ce2064ab

Scanner detections:
17 / 68

Status:
Malware

Analysis date:
11/30/2024 3:37:35 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2099629
738

Avira AntiVirus
BDS/Trubsil.339076
7.11.204.154

AVG
BackDoor.Generic18
2016.0.3216

Bitdefender
Trojan.GenericKD.2099629
1.0.20.140

Bkav FE
HW32.Packed
1.3.0.6379

Emsisoft Anti-Malware
Trojan.GenericKD.2099629
8.15.01.28.03

F-Secure
Trojan.GenericKD.2099629
11.2015-28-01_4

G Data
Trojan.GenericKD.2099629
15.1.24

IKARUS anti.virus
Backdoor.Win32.Trubsil
t3scan.1.8.6.0

McAfee
Artemis!11DD7DC3C1B4
5600.6872

Microsoft Security Essentials
Backdoor:Win32/Trubsil.A
1.11302

MicroWorld eScan
Trojan.GenericKD.2099629
16.0.0.84

nProtect
Trojan.GenericKD.2099629
15.01.22.01

Qihoo 360 Security
HEUR/QVM20.1.Malware.Gen
1.0.0.1015

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.15126

Trend Micro House Call
TROJ_GEN.R028H01AK15
7.2.28

VIPRE Antivirus
Trojan.Win32.Generic
36894

File size:
331.1 KB (339,076 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\system\8101.tmp.exe

File PE Metadata
Compilation timestamp:
1/18/2015 8:33:18 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:h057JEgn8/QJIGsyqUD9MdyRF4QiTdrBGoyx8bOqTkpvsdVHlUP6g5:hIagnhJ8ypDoMipoh18lUR

Entry address:
0x1000

Entry point:
55, 8B, EC, 83, EC, 74, 53, 56, 57, C7, 45, A8, FF, 79, 00, 00, C7, 45, E8, 30, 90, 41, 00, C7, 45, DC, 7F, 00, 00, 00, C7, 45, F4, AC, 00, 00, 00, C7, 45, EC, 35, 03, 00, 00, C7, 45, F8, 82, 01, 00, 00, C7, 45, B8, 66, 00, 00, 00, C7, 45, E0, DF, 01, 00, 00, C7, 45, B0, 49, 01, 00, 00, C7, 45, C4, 72, 00, 00, 00, C7, 45, BC, AE, 00, 00, 00, C7, 45, C8, 21, 02, 00, 00, C7, 45, D0, E3, 02, 00, 00, C7, 45, FC, 5D, 03, 00, 00, C7, 45, CC, 7B, 02, 00, 00, C7, 45, C0, 10, 01, 00, 00, C7, 45, AC, E7, 01, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
60 KB (61,440 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
8101.tmp

Command:
C:\ProgramData\system\8101.tmp.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www11.aname.net  (89.221.250.11:80)

TCP (HTTP):
Connects to ws126.cs.provider.nl  (109.106.171.224:80)

TCP (HTTP):
Connects to web1.vaccoda.com  (31.24.110.2:80)

TCP (HTTP):
Connects to uk66.verygoodserver.com  (87.117.246.99:80)

TCP (HTTP):
Connects to svr6.acornhost.com  (67.225.137.217:80)

TCP (HTTP):
Connects to server.ecasm.net  (66.135.59.18:80)

TCP (HTTP):
Connects to ramjet.3v0.net  (46.249.202.170:80)

TCP (HTTP):
Connects to r101.websiteservername.com  (65.39.128.37:80)

TCP (HTTP):
Connects to perfora.net  (198.251.75.238:80)

TCP (HTTP):
Connects to p3nlhg618c1618.shr.prod.phx3.secureserver.net  (50.62.254.1:80)

TCP (HTTP):
Connects to p3nlhg37c069.shr.prod.phx3.secureserver.net  (97.74.249.1:80)

TCP (HTTP):
Connects to p3nlhg276c1276.shr.prod.phx3.secureserver.net  (184.168.43.1:80)

TCP (HTTP):
Connects to ip-72-167-205-62.ip.secureserver.net  (72.167.205.62:80)

TCP (HTTP):
Connects to ip-69.65.59.240.servernap.net  (69.65.59.240:80)

TCP (HTTP):
Connects to ip-208-109-254-153.ip.secureserver.net  (208.109.254.153:80)

TCP (HTTP):
Connects to host-195-37-105-055.schule.bremen.de  (195.37.105.55:80)

TCP (HTTP):
Connects to host1.emanagementcorp.com  (138.128.164.210:80)

TCP (HTTP):
Connects to hawk.directrouter.co.uk  (89.145.69.72:80)

TCP (HTTP):
Connects to ekiaioiqks.gs07.gridserver.com  (205.186.183.124:80)

TCP (HTTP):
Connects to cp-kil-m-005.micron21.com  (27.131.109.162:80)

Remove 8101.tmp.exe - Powered by Reason Core Security