emuletorrent.exe

ROMEO SOUTH SL

The application emuletorrent.exe by ROMEO SOUTH SL has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address travian-utils.org on port 5041.
Publisher:
ROMEO SOUTH SL  (signed and verified)

MD5:
da1b8fc8ce42f1b892b8604b2a05f995

SHA-1:
fe76ac5734a8143eda69531e0867ab40a702d0ea

SHA-256:
03317c2a529378b54ddf706619c29913f041ffb35eee6e0f26f68e863b0bfbeb

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/24/2024 12:49:01 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Vitallia.ROMEOSOUTH (M)
16.2.6.10

File size:
8.6 MB (8,974,544 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\emuletorrent\emuletorrent\emuletorrent.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
6/16/2015 5:41:38 AM

Valid to:
6/19/2016 2:09:57 PM

Subject:
CN=ROMEO SOUTH SL, O=ROMEO SOUTH SL, L=Madrid, S=Madrid, C=ES

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
00E9FE7942126D0E38

File PE Metadata
Compilation timestamp:
9/16/2015 11:55:26 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:/YHRNbKbVEdBZb6VBZJ7XYgAe4+YfFjSRRAfMWnj412YLQgQxAPF/nVPmA/yI78K:/AjKbVM3bkp7XYgA7FjXYi+aYLLzgk

Entry address:
0x38D6C0

Entry point:
E8, 83, 07, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, FF, 75, 08, E8, A5, F8, FF, FF, 59, 5D, C3, 8B, FF, 55, 8B, EC, 5D, E9, 1B, FB, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 55, 33, FF, 33, ED, 8B, 44, 24, 14, 0B, C0, 7D, 15, 47, 45, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 28, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1...
 
[+]

Code size:
4 MB (4,232,192 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to wb-in-f154.1e100.net  (66.102.1.154:443)

TCP:
Connects to travian-utils.org  (77.120.115.66:5041)

TCP:
Connects to node45.hvosting.ua  (91.200.42.46:1176)

TCP:
Connects to cpe-181-44-183-67.telecentro-reversos.com.ar  (181.44.183.67:8280)

TCP:
Connects to cm-93-156-91-176.telecable.es  (93.156.91.176:4661)

TCP:
Connects to cm-81-9-218-171.telecable.es  (81.9.218.171:33665)

TCP:
Connects to 53.red.148.114.93.procono.es  (93.114.148.57:6375)

TCP:
Connects to 186-94-129-74.genericrev.cantv.net  (186.94.129.74:37688)

TCP:
Connects to 186-88-210-201.genericrev.cantv.net  (186.88.210.201:17877)

Remove emuletorrent.exe - Powered by Reason Core Security