epftpsetup_win.exe

mySingle EpFtp Client

Samsung SDS Co., Ltd

The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from w1.samsung.net and multiple other hosts.
Publisher:
mySingle  (signed by Samsung SDS Co., Ltd)

Product:
mySingle EpFtp Client

Version:
6.0

MD5:
c2919a0b4f10338776512fd988cb7df5

SHA-1:
6a3fd5758f193a8988e7a5ae490135a4965dd915

SHA-256:
111963c4e635c2a7be9ddb11bebf71c648d6aa094ee58abf6ccccf07e37daeef

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
12/29/2024 1:44:23 AM UTC  (today)

File size:
16.1 MB (16,901,336 bytes)

Product version:
6.0

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Digital Signature
Authority:
Thawte Consulting (Pty) Ltd.

Valid from:
11/6/2009 9:00:00 AM

Valid to:
1/6/2011 8:59:59 AM

Subject:
CN="Samsung SDS Co., Ltd", O="Samsung SDS Co., Ltd", L=SEOUL, S=GYEONGGI-DO, C=KR

Issuer:
CN=Thawte Code Signing CA, O=Thawte Consulting (Pty) Ltd., C=ZA

Serial number:
0C9629A48889F0D8D578629C5606E599

File PE Metadata
Compilation timestamp:
12/6/2009 7:53:24 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
393216:/rDJWTk5IJ7lNnamC9Ht9iJJx289UcHuTN0lX2GmB:zDJ4kGJBZIbK2kUrTN0R2RB

Entry address:
0x355E

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B8, A7, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 80, 40, 00, 53, FF, 15, 88, 82, 40, 00, 6A, 08, A3, 98, 10, 43, 00, E8, D6, 2E, 00, 00, A3, E4, 0F, 43, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, E8, A7, 42, 00, FF, 15, 58, 81, 40, 00, 68, AC, A7, 40, 00, 68, E0, 07, 43, 00, E8, DC, 29, 00, 00, FF, 15, AC, 80, 40, 00, BF, 00, 70, 43, 00, 50, 57, E8, CA, 29, 00, 00...
 
[+]

Entropy:
7.9990

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file epftpsetup_win.exe has been seen being distributed by the following 2 URLs.