buool.exe

LgGJSHMt

The executable buool.exe has been detected as malware by 6 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘buool’. While running, it connects to the Internet address 192.193.28.185.gransy.com on port 8000.
Product:
LgGJSHMt

Version:
9.39

MD5:
0d64d72144f23ab381dac4a627157ee5

SHA-1:
42547f677664b8f3823814e50eff80eb4e8643a3

SHA-256:
3f744c68d0a0634666de6fe9b54399797dc6f3203790b1e7e04c558640a4f394

Scanner detections:
6 / 68

Status:
Malware

Analysis date:
11/24/2024 12:28:11 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Worm/Generic_vb.ANV
2013.0.4477

Clam AntiVirus
Win.Trojan.VB-1421
0.98/23018

Dr.Web
Trojan.MulDrop4.60439
9.0.1.05190

ESET NOD32
Win32/AutoRun.VB.RT worm
6.3.12010.0

F-Prot
W32/Vobfus.E.gen
4.6.5.141

F-Secure
Worm:W32/Vobfus.BS
5.15.154

File size:
135 KB (138,240 bytes)

Product version:
9.39

Original file name:
LgGJSHMt.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\max\buool.exe

File PE Metadata
Compilation timestamp:
7/24/2010 4:28:50 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x11F0

Entry point:
68, C4, 12, 40, 00, E8, F0, FF, FF, FF, 00, 00, 48, 00, 00, 00, 30, 00, 00, 00, 40, 00, 00, 00, 00, 00, 00, 00, F2, B5, 37, D8, 48, 73, FD, 4B, B0, 05, 2A, 16, 76, 21, AF, 5E, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 2D, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 90, 00, 00, 00, 00, 00, 00, 00, 02, 00, 00, 00, 04, 00, 00, 00, 1F, D5, AA, 75, 27, CC, EA, 4C, 97, C8, 8A, DB, 73, 52, A9, EE, 01, 00, 00, 00, A0, 00, 00, 00...
 
[+]

Entropy:
5.8153

Developed / compiled with:
Microsoft Visual Basic v5.0

Code size:
131.5 KB (134,656 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
buool

Command:
C:\users\max\buool.exe


The executing file has been seen to make the following network communication in live environments.

TCP:
Connects to 192.193.28.185.gransy.com  (185.28.193.192:8000)

Remove buool.exe - Powered by Reason Core Security