fastgsm_client.exe

The application fastgsm_client.exe has been detected as a potentially unwanted program by 19 anti-malware scanners. The program is a setup application that uses the Self-extracting archive installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from filedir.com and multiple other hosts.
MD5:
0ca7ea355c285a311d3d10e950689703

SHA-1:
677524ea558769b204ca965828a8b949262b490f

SHA-256:
67aea21156844c53d09ca86aa918bc064a84964916ee5a8a0f4a4d8cfba625e7

Scanner detections:
19 / 68

Status:
Potentially unwanted

Analysis date:
11/24/2024 11:52:53 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

avast!
ELF:Androot-J [PUP]
2014.9-160218

AVG
Exploit_c
2017.0.2829

Comodo Security
UnclassifiedMalware
23476

Dr.Web
- infected archive c:\users\test\appdata\local\temp\f7f818438fffa2e370fe6f15b01554e48b995d77\_??\ns
9.0.1.05190

ESET NOD32
multiple threats
8.0.319.0

Fortinet FortiGate
Android/ZergRush.B!exploit
2/18/2016

G Data
Linux.Riskware.Neuter
16.2.25

IKARUS anti.virus
Linux.Riskware.Neuter
t3scan.1.9.5.0

K7 AntiVirus
Exploit
13.212.17643

Kaspersky
HEUR:Exploit.Linux.Lotoor
14.0.0.640

McAfee
Artemis!0CA7EA355C28
5600.6485

Microsoft Security Essentials
HackTool:AndroidOS/ZergRush.B
1.1.12205.0

NANO AntiVirus
Riskware.Rooter.dshucf
0.30.26.3947

Panda Antivirus
Trj/CI.A
16.02.18.10

Qihoo 360 Security
HEUR/QVM06.2.Malware.Gen
1.0.0.1015

Quick Heal
Exploit.Zergrush.C48
2.16.14.00

Sophos
Andr/DroidRt-C
4.98

Trend Micro
TROJ_GEN.R01TC0RF615
10.465.18

VIPRE Antivirus
Trojan.Win32.Generic
44820

File size:
5.6 MB (5,904,410 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Self-extracting archive

Common path:
C:\users\{user}\downloads\fastgsm_client.exe

File PE Metadata
Compilation timestamp:
2/15/2015 9:00:31 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:6FeM99UgGkB03/PihCg17nBz2NueAQ5MKSWYhAYLKnXo+TbPXWwf2PxcUFC2vRSu:j+lGO0HAHdnau3QyK/brnXJT7Vf2+ECI

Entry address:
0x1D7CB

Entry point:
E8, 85, 63, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 82, FC, FF, FF, C7, 06, 20, B2, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, 20, B2, 42, 00, E9, 37, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, 20, B2, 42, 00, E8, 24, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 52, CA, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Code size:
162 KB (165,888 bytes)

The file fastgsm_client.exe has been seen being distributed by the following 2 URLs.

https://filedir.com/.../965106

Remove fastgsm_client.exe - Powered by Reason Core Security