elbbj.exe

The executable elbbj.exe has been detected as malware by 23 anti-virus scanners. While running, it connects to the Internet address 85-234-141-72.static.as29550.net on port 80 using the HTTP protocol.
MD5:
0612402ad98c8c31cd6f2b914a419039

SHA-1:
169492897a667322c3ffcabf96834244a4477ec8

SHA-256:
f9b8f7f285f811ee720cce7bccd98a421a26fb90dd7b022118d4b4e1f340036b

Scanner detections:
23 / 68

Status:
Malware

Analysis date:
11/6/2024 12:29:17 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Generic.Malware.FYdld.A4EB0AFB
960

AhnLab V3 Security
Trojan/Win32.CSon
2014.06.17

Avira AntiVirus
TR/Downloader.Gen
7.11.155.68

avast!
Win32:Sality-GR
2014.9-140619

Baidu Antivirus
Backdoor.Win32.Generic
4.0.3.14619

Bitdefender
Generic.Malware.FYdld.A4EB0AFB
1.0.20.850

Dr.Web
Trojan.DownLoader.origin
9.0.1.0170

Emsisoft Anti-Malware
Generic.Malware.FYdld.A4EB0AFB
8.14.06.19.12

ESET NOD32
Win32/Agent.HLU (variant)
8.9958

F-Prot
W32/Heuristic-170
v6.4.7.1.166

F-Secure
Trojan-Proxy:W32/Pramro.D
11.2014-19-06_5

G Data
Generic.Malware.FYdld.A4EB0AFB
14.6.24

Kaspersky
HEUR:Backdoor.Win32.Generic
14.0.0.3687

Microsoft Security Essentials
TrojanProxy:Win32/Pramro.H
1.10600

MicroWorld eScan
Generic.Malware.FYdld.A4EB0AFB
15.0.0.510

Norman
Pramro.C
11.20140619

Panda Antivirus
Trj/Genetic.gen
14.06.19.12

Qihoo 360 Security
Win32/Backdoor.d55
1.0.0.1015

Sophos
Mal/TinyDL-T
4.98

Total Defense
Win32/Maazben!generic
37.0.11004

Trend Micro House Call
TROJ_PRAMRO.SMI
7.2.170

Trend Micro
TROJ_PRAMRO.SMI
10.465.19

Vba32 AntiVirus
SScope.Backdoor.Saloty
3.12.26.0

File size:
12.7 KB (12,970 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\elbbj.exe

File PE Metadata
Compilation timestamp:
6/17/2014 9:34:23 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
192:b27JnLf6I/GmIMI6Wys8M9xOp95rR6F/266w2nFv8q6rRBQaznn7Bjn:bqiI/Gvlysnezo4nFkqQaK7BD

Entry address:
0x6D590

Entry point:
60, BE, 00, B0, 46, 00, 8D, BE, 00, 60, F9, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.0937

Packer / compiler:
UPX 2.90LZMA]

Code size:
12 KB (12,288 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 85-234-141-72.static.as29550.net  (85.234.141.72:80)

TCP (HTTP):
Connects to ip-172-26-136-19.ec2.internal  (172.26.136.19:80)

TCP (HTTP):
Connects to box361.bluehost.com  (69.89.31.161:80)

TCP (HTTP):
Connects to 217-160-0-4.elastic-ssl.ui-r.com  (217.160.0.4:80)

TCP (HTTP):
Connects to 217-160-0-39.elastic-ssl.ui-r.com  (217.160.0.39:80)

TCP:
Connects to static-114.76.12.61-tataidc.co.in  (61.12.76.114:3173)

TCP:
Connects to static.vnpt.vn  (14.177.64.98:4419)

TCP:
Connects to sjn.httpint2.globe.com.ph  (112.198.77.166:5918)

TCP (HTTP):
Connects to 31-193-142-216.static.as29550.net  (31.193.142.216:80)

TCP:
Connects to 191-8-123-189.user.vivozap.com.br  (191.8.123.189:7431)

TCP:
Connects to WIN-MGIB0IP4L15  (222.253.192.114:3386)

TCP:
Connects to vmi35970.contabo.host  (213.136.93.123:8141)

TCP:
Connects to triband-mum-120.61.221.123.mtnl.net.in  (120.61.221.123:7553)

TCP:
Connects to sjn.httpint.globe.com.ph  (112.198.79.9:7301)

TCP:
Connects to o0nx3i.static.otenet.gr  (94.70.252.251:1799)

TCP (HTTP):
Connects to hostedc40.carrierzone.com  (64.29.151.221:80)

TCP (HTTP):
Connects to ec2-34-194-244-120.compute-1.amazonaws.com  (34.194.244.120:80)

TCP (HTTP):
Connects to cp-in-7.webhostbox.net  (111.118.215.251:80)

TCP (HTTP):
Connects to box383.bluehost.com  (69.89.31.183:80)

TCP:
Connects to aua.httpint.globe.com.ph  (112.198.82.228:1396)

Remove elbbj.exe - Powered by Reason Core Security