d4d6.tmp.exe

The application d4d6.tmp.exe has been detected as a potentially unwanted program by 22 anti-malware scanners.
MD5:
e95abdd61f290e6e6776a51d635503d7

SHA-1:
a716813d54e670a9d399233c0ea63502bdc5ee73

SHA-256:
682bf1f9b75f97c7084bfff6b5e78038467026f6e0d8772c6280e4f870af2af1

Scanner detections:
22 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 3:30:54 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.303932
121

AegisLab AV Signature
Gen.Variant.Graftor!c
2.1.4+

AhnLab V3 Security
Malware/Gen.Generic.N2101918543
3.7.5.15

Arcabit
Trojan.Graftor.D4A33C
1.0.0.774

Bitdefender
Gen:Variant.Graftor.303932
1.0.20.1400

Bkav FE
W32.Clodacd.Trojan
1.3.0.8383

Emsisoft Anti-Malware
Gen:Variant.Graftor.303932
8.16.10.06.03

Fortinet FortiGate
PossibleThreat
10/6/2016

F-Prot
W32/S-c6aa7d3f
v6.4.7.1.166

F-Secure
Gen:Variant.Graftor.303932
11.2016-06-10_5

G Data
Gen:Variant.Graftor.303932
16.10.25

IKARUS anti.virus
PUA.Techsnab
t3scan.2.1.6.0

Malwarebytes
Trojan.Downloader
v2016.10.06.03

McAfee
RDN/Generic.com
5600.6255

MicroWorld eScan
Gen:Variant.Graftor.303932
17.0.0.840

Panda Antivirus
Trj/GdSda.A
16.10.06.03

Reason Heuristics
Trojan.Dropper.RM
16.10.5.23

Rising Antivirus
Malware.Heuristic!ET (rdm+)
23.00.65.161004

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_GEN.R0EAC0OIE16
7.2.280

Trend Micro
TROJ_GEN.R0EAC0OIE16
10.465.06

VIPRE Antivirus
Trojan.Win32.Generic
52788

File size:
109 KB (111,616 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\d4d6.tmp.exe

File PE Metadata
Compilation timestamp:
9/9/2016 12:59:00 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:mxTcgwbeHI1fueGS+NU3Arqsm5ycsQgX/PKsTpUd1ZnXeqk6YGfAK2ylRvfZ:mxT5GlfynUQLm5kQg3xWU4ZAK2yll

Entry address:
0x55F2

Entry point:
E8, 72, 2D, 00, 00, E9, 95, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 53, 8B, 5D, 0C, 66, 83, 3B, 00, 57, 8B, F8, 74, 43, 0F, B7, 08, 66, 85, C9, 74, 39, 8B, D1, 2B, C3, 8B, 4D, 0C, 66, 85, D2, 74, 19, 0F, B7, 11, 66, 85, D2, 74, 2B, 0F, B7, 1C, 08, 2B, DA, 75, 09, 83, C1, 02, 66, 39, 1C, 08, 75, E7, 66, 83, 39, 00, 74, 14, 83, C7, 02, 0F, B7, 17, 83, C0, 02, 66, 85, D2, 75, CB, 33, C0, 5F, 5B, 5D, C3, 8B, C7, EB, F8, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84...
 
[+]

Entropy:
6.4419

Code size:
76 KB (77,824 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.82.188:443)

Remove d4d6.tmp.exe - Powered by Reason Core Security