Downloader.exe

Beijing ELEX Technology Co.,Ltd

The application Downloader.exe by Beijing ELEX Technology Co.,Ltd has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address a7.c8.24ae.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
V9 Downloader  (signed by Beijing ELEX Technology Co.,Ltd)

Product:
V9 Downloader

Version:
3.4

MD5:
2b9d85f7ec8eac0de4777be71b25da7c

SHA-1:
a76690774961ec4d30c429e272d8f461fcc4cf68

SHA-256:
22a6ff16dc134d8e0d284796142fd27c8cc90833ed455b706ad10b3d37300548

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/23/2024 12:21:23 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.ELEX.BeijingELEXTechnology (M)
16.1.19.4

File size:
1.2 MB (1,310,528 bytes)

Product version:
3.4

Copyright:
www.v9.com

Original file name:
Downloader.exe

File type:
Executable application (Win32 EXE)

Language:
Chinese

Common path:
C:\users\{user}\appdata\local\temp\downloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/14/2011 2:00:00 AM

Valid to:
6/13/2012 1:59:59 AM

Subject:
CN="Beijing ELEX Technology Co.,Ltd", OU=Strategy Development, OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Beijing ELEX Technology Co.,Ltd", L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
48B52693ECDF28866B6A2D36EE57B080

File PE Metadata
Compilation timestamp:
4/13/2012 6:56:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:L8cxXJnPTPU6yqNlunfNkB80KwSzck7MZXdO7UVwt:N9JnjDynfCO0K947ZtHVA

Entry address:
0x2B18A0

Entry point:
60, BE, 00, 20, 5D, 00, 8D, BE, 00, F0, E2, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA

Code size:
896 KB (917,504 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to a7.c8.24ae.ip4.static.sl-reverse.com  (174.36.200.167:80)

Remove Downloader.exe - Powered by Reason Core Security