ed2k.exe

aMulew

http://www.amulew.org/

The application ed2k.exe, “ED2K Links Handler” has been detected as a potentially unwanted program by 2 anti-malware scanners. It runs as a windows Service named “ed2k idle service”. While running, it connects to the Internet address server-52-85-77-217.lax3.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
http://www.amulew.org/

Product:
aMulew

Description:
ED2K Links Handler

Version:
2.4.0

MD5:
c74d0ecbce8ec9ebf48273bca2d6d79e

SHA-1:
b75cf65a794a8aa3195eae35cfc2bf261309261a

SHA-256:
ecc13a9d423737f672d9cdf06ec3e00302d27f1363b271cf4df4359495d807e2

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 6:35:15 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Adware.ELEX.EL application
6.3.12010.0

Kaspersky
Trojan-Downloader.Win32.Eroyee
15.0.2.529

File size:
232 KB (237,568 bytes)

Product version:
2.4.0

Copyright:
aMulew Team ( admin@amule.org )

Original file name:
ed2k.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\amulecexx\ed2k.exe

File PE Metadata
Compilation timestamp:
3/3/2017 2:45:26 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
12.0

Entry address:
0xDC97

Entry point:
E8, 5F, C5, 00, 00, E9, 7B, FE, FF, FF, E8, D4, 6F, 00, 00, 8B, D0, 8B, 42, 6C, 3B, 05, 54, 9E, 43, 00, 74, 10, 8B, 0D, 18, 9F, 43, 00, 85, 4A, 70, 75, 05, E8, 16, 66, 00, 00, 8B, 40, 04, C3, E8, AE, 6F, 00, 00, 8B, D0, 8B, 42, 6C, 3B, 05, 54, 9E, 43, 00, 74, 10, 8B, 0D, 18, 9F, 43, 00, 85, 4A, 70, 75, 05, E8, F0, 65, 00, 00, 05, A0, 00, 00, 00, C3, E8, 86, 6F, 00, 00, 8B, D0, 8B, 42, 6C, 3B, 05, 54, 9E, 43, 00, 74, 10, 8B, 0D, 18, 9F, 43, 00, 85, 4A, 70, 75, 05, E8, C8, 65, 00, 00, 8B, 40, 74, C3, 55, 8B...
 
[+]

Code size:
175.5 KB (179,712 bytes)

Service
Display name:
ed2k idle service

Service name:
ed2kidle

Description:
execute ed2k task in idle time

Type:
Win32OwnProcess, InteractiveProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-25-253.mxp4.r.cloudfront.net  (54.192.25.253:80)

TCP (HTTP):
Connects to server-52-85-151-241.hkg51.r.cloudfront.net  (52.85.151.241:80)

TCP (HTTP):
Connects to server-54-230-150-245.sin2.r.cloudfront.net  (54.230.150.245:80)

TCP (HTTP):
Connects to server-54-230-0-61.lhr5.r.cloudfront.net  (54.230.0.61:80)

TCP (HTTP):
Connects to server-54-192-25-165.mxp4.r.cloudfront.net  (54.192.25.165:80)

TCP (HTTP):
Connects to server-54-192-159-131.sin3.r.cloudfront.net  (54.192.159.131:80)

TCP (HTTP):
Connects to server-52-84-246-127.sfo20.r.cloudfront.net  (52.84.246.127:80)

TCP (HTTP):
Connects to server-54-192-230-148.waw50.r.cloudfront.net  (54.192.230.148:80)

TCP (HTTP):
Connects to server-52-85-77-187.lax3.r.cloudfront.net  (52.85.77.187:80)

TCP (HTTP):
Connects to server-54-230-191-241.maa3.r.cloudfront.net  (54.230.191.241:80)

TCP (HTTP):
Connects to server-54-230-191-147.maa3.r.cloudfront.net  (54.230.191.147:80)

TCP (HTTP):
Connects to server-52-85-33-96.mnl50.r.cloudfront.net  (52.85.33.96:80)

TCP (HTTP):
Connects to server-54-192-159-76.sin3.r.cloudfront.net  (54.192.159.76:80)

TCP (HTTP):
Connects to server-52-85-151-13.hkg51.r.cloudfront.net  (52.85.151.13:80)

TCP (HTTP):
Connects to server-54-230-150-107.sin2.r.cloudfront.net  (54.230.150.107:80)

TCP (HTTP):
Connects to server-54-192-159-80.sin3.r.cloudfront.net  (54.192.159.80:80)

TCP (HTTP):
Connects to server-52-85-77-217.lax3.r.cloudfront.net  (52.85.77.217:80)

TCP (HTTP):
Connects to server-52-85-74-81.lhr3.r.cloudfront.net  (52.85.74.81:80)

TCP (HTTP):
Connects to server-52-85-33-53.mnl50.r.cloudfront.net  (52.85.33.53:80)

TCP (HTTP):
Connects to server-54-239-132-231.sfo9.r.cloudfront.net  (54.239.132.231:80)

Remove ed2k.exe - Powered by Reason Core Security