flashplayer_146.exe

The executable flashplayer_146.exe has been detected as malware by 27 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from skydrive.live.com.
Description:
37fjcyu

Version:
0.0.9.9

MD5:
9fd893d71dc2a3225fdd43480c3af0c6

SHA-1:
3557a9368d354ce99792ea12f62e74fb7a812dfb

SHA-256:
95fae2f22f2eb2973743cc181685d02bc4321e028b20b3dbd58a1f7e576e240c

Scanner detections:
27 / 68

Status:
Malware

Analysis date:
12/27/2024 8:18:06 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.1429014
315

Avira AntiVirus
TR/Rogue.1429014
7.11.119.208

avast!
Win32:Malware-gen
2014.9-160325

AVG
Generic10_c
2017.0.2793

Baidu Antivirus
Trojan.Win32.InfoStealer
4.0.3.16325

Bitdefender
Trojan.GenericKD.1429014
1.0.20.425

Dr.Web
Trojan.DownLoader10.56194
9.0.1.085

ESET NOD32
Win32/TrojanDownloader.Autoit.NNI (variant)
10.9174

Fortinet FortiGate
W32/AutoIt.RZ!worm
3/25/2016

F-Prot
W32/Undefined.Threat
v6.4.7.1.166

F-Secure
Trojan.GenericKD.1429014
11.2016-25-03_6

G Data
Trojan.GenericKD.1429014
16.3.22

IKARUS anti.virus
Trojan-PWS.Win32.Fareit
t3scan.2.2.29

K7 AntiVirus
Trojan-Downloader
13.174.10509

Kaspersky
Trojan-PSW.Win32.Fareit
14.0.0.462

Malwarebytes
Spyware.ZeuS
v2016.03.25.04

McAfee
Artemis!9FD893D71DC2
5600.6449

MicroWorld eScan
Trojan.GenericKD.1429014
17.0.0.255

Norman
Autoit.ACRS
11.20160325

Panda Antivirus
Trj/CI.A
16.03.25.04

Rising Antivirus
AU3SCRIPT:Malware.Banker!1.9DF6
23.00.65.16323

Sophos
Mal/Generic-S
4.96

Trend Micro House Call
TROJ_MOSERAN.BMC
7.2.85

Trend Micro
TROJ_MOSERAN.BMC
10.465.25

Vba32 AntiVirus
Trojan.Autoit.Banker
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
24380

ViRobot
Trojan.Win32.S.Agent.399463
2011.4.7.4223

File size:
390.1 KB (399,463 bytes)

Copyright:
1990-2013 37fjcyu

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flashplayer_146.exe

File PE Metadata
Compilation timestamp:
1/29/2012 2:32:28 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:k6Wq4aaE6KwyF5L0Y2D1PqLXnEHjdbudv/c:ithEVaPqLXnERbc3c

Entry address:
0xB2E60

Entry point:
60, BE, 00, 10, 47, 00, 8D, BE, 00, 00, F9, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Entropy:
7.9497

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
268 KB (274,432 bytes)

The file flashplayer_146.exe has been seen being distributed by the following URL.

Remove flashplayer_146.exe - Powered by Reason Core Security