celsakq.exe

The executable celsakq.exe has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address net4-ip216.linkbg.com on port 15252.
MD5:
d8d7c6cab04bd530ca9e9d4b295484d5

SHA-1:
de54586423be49318d0503eb3f524bad36b4730e

SHA-256:
95ce5ae07a572fefa3ae777c9e2aa9d3d41a73f3111b5478490bcbf0f0497f2c

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/26/2024 4:57:23 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Downloader.PE (M)
17.2.4.7

File size:
732 KB (749,568 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\celsakq.exe

File PE Metadata
Compilation timestamp:
12/9/2006 12:38:19 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

Entry address:
0x22B93

Entry point:
6A, 60, 68, F8, B7, 42, 00, E8, ED, F7, FF, FF, BF, 94, 00, 00, 00, 8B, C7, E8, 45, F2, FF, FF, 89, 65, E8, 8B, F4, 89, 3E, 56, FF, 15, 84, A0, 42, 00, 8B, 4E, 10, 89, 0D, 28, 3B, 46, 00, 8B, 46, 04, A3, 34, 3B, 46, 00, 8B, 56, 08, 89, 15, 38, 3B, 46, 00, 8B, 76, 0C, 81, E6, FF, 7F, 00, 00, 89, 35, 2C, 3B, 46, 00, 83, F9, 02, 74, 0C, 81, CE, 00, 80, 00, 00, 89, 35, 2C, 3B, 46, 00, C1, E0, 08, 03, C2, A3, 30, 3B, 46, 00, 33, F6, 56, 8B, 3D, 7C, A0, 42, 00, FF, D7, 66, 81, 38, 4D, 5A, 75, 1F, 8B, 48, 3C, 03...
 
[+]

Entropy:
3.9281

Developed / compiled with:
Microsoft Visual C++ v7.0

Code size:
164 KB (167,936 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to live.selapa.com  (173.199.148.208:80)

TCP (HTTP):
Connects to a23-53-214-151.deploy.static.akamaitechnologies.com  (23.53.214.151:80)

TCP:
Connects to 78-61-213-199.static.zebra.lt  (78.61.213.199:43121)

TCP:
Connects to 78-58-15-154.static.zebra.lt  (78.58.15.154:44998)

TCP:
Connects to 88-222-99-23.meganet.lt  (88.222.99.23:35767)

TCP (HTTP):
Connects to sinkhole-01.sinkhole.tech  (95.211.174.92:80)

TCP (HTTP):
Connects to a23-198-117-130.deploy.static.akamaitechnologies.com  (23.198.117.130:80)

TCP:
Connects to 78-62-77-233.static.zebra.lt  (78.62.77.233:29101)

TCP:
Connects to 78-61-59-41.static.zebra.lt  (78.61.59.41:37527)

TCP:
Connects to 4d4ea2c8.ip-pool.rftonline.net  (77.78.162.200:25783)

TCP:
Connects to 221-89-119-82.orbital.bg  (82.119.89.221:35226)

TCP:
Connects to unknown.ddns-lan.rakovski.ekk.bg  (89.215.179.156:13751)

TCP:
Connects to net4-ip216.linkbg.com  (83.222.181.216:15252)

TCP (HTTP):
Connects to ip234.208-100-26.static.steadfastdns.net  (208.100.26.234:80)

TCP:
Connects to host-static-92-115-136-125.moldtelecom.md  (92.115.136.125:36319)

TCP:
Connects to client-212-117-4-190.cgates.lt  (212.117.4.190:17927)

TCP:
Connects to 90-154-173-174.ip.btc-net.bg  (90.154.173.174:19742)

TCP:
Connects to 86-100-41-42-ip.balticum.lt  (86.100.41.42:21109)

Remove celsakq.exe - Powered by Reason Core Security