conexion_via_cliente_telnet__3311__.exe

ScrSelfPlayer Application

The executable conexion_via_cliente_telnet__3311__.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from idatvirtual.edu.pe.
Product:
ScrSelfPlayer Application

Description:
ScrSelfPlayer

Version:
1, 2, 0, 1

MD5:
949678f9a52db76a651b1df9023fd902

SHA-1:
8f1bc36fb296ab79029d0cb24daf917057b6bf7b

SHA-256:
13bb05268722012d5c06fd5219b783c2e029813dd42c633df72bd75788d8b31e

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/24/2024 9:31:18 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.7.9.20

File size:
4.7 MB (4,926,729 bytes)

Product version:
1, 2, 0, 1

Copyright:
Copyright (C) 2007 Stepok Image Lab.

Original file name:
ScrSelfPlayer.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\conexion_via_cliente_telnet__3311__.exe

File PE Metadata
Compilation timestamp:
11/22/2007 7:40:36 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:0y4w94ZFx7b3lcTzfMI82GZ0FDVuMD6OOoytDYj+Le9FDJfKBkMt0Bc:bgPqTzfm2Y7DOOoytYj+L6VJCpJ

Entry address:
0x2B5E0

Entry point:
60, BE, 00, 60, 41, 00, 8D, BE, 00, B0, FE, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.9661

Packer / compiler:
UPX 2.90LZMA

Code size:
88 KB (90,112 bytes)

The file conexion_via_cliente_telnet__3311__.exe has been seen being distributed by the following URL.

Remove conexion_via_cliente_telnet__3311__.exe - Powered by Reason Core Security