flashplayer_update.exe

The executable flashplayer_update.exe has been detected as malware by 26 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from www.txtpadonline.com.
Version:
1.0.0.0

MD5:
9e22e7c71ee9662c5c0066998d7c5c33

SHA-1:
cf32dcfbeffc27c8a4959f43eb39ac346054e7e0

SHA-256:
ab4c2fbb2156342e9b947fc6281ce2a894b1191b5b2808417771511e5e80ca9d

Scanner detections:
26 / 68

Status:
Malware

Analysis date:
12/28/2024 5:48:58 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.166103
391

Agnitum Outpost
Trojan.PWS.Banbra
7.1.1

AhnLab V3 Security
Trojan/Win32.Bladabindi
2015.12.11

Avira AntiVirus
TR/Agent.13784
8.3.2.4

Arcabit
Trojan.Zusy.D288D7
1.0.0.629

avast!
MSIL:Banker-EF [Trj]
2014.9-160109

AVG
PSW.Banker7
2017.0.2869

Baidu Antivirus
Trojan.Win32.Generik
4.0.3.1619

Bitdefender
Gen:Variant.Zusy.166103
1.0.20.45

Emsisoft Anti-Malware
Gen:Variant.Zusy.166103
8.16.01.09.07

ESET NOD32
MSIL/TrojanProxy.Agent.AY (variant)
10.12706

Fortinet FortiGate
MSIL/Agent.AY!tr
1/9/2016

F-Secure
Gen:Variant.Zusy.166103
11.2016-09-01_7

G Data
Gen:Variant.Zusy.166103
16.1.25

IKARUS anti.virus
Trojan.MSIL.Trojanproxy
t3scan.1.9.5.0

K7 AntiVirus
Trojan
13.212.18079

Kaspersky
Trojan-Banker.Win32.Banbra
14.0.0.841

McAfee
RDN/PWS-Banker
5600.6525

Microsoft Security Essentials
TrojanProxy:MSIL/Segyroxb.A
1.1.12300.0

MicroWorld eScan
Gen:Variant.Zusy.166103
17.0.0.27

NANO AntiVirus
Trojan.Win32.Banbra.dyppbq
1.0.10.5081

Panda Antivirus
Trj/CI.A
16.01.09.07

Quick Heal
TrojanProxy.Segyroxb.r3
1.16.14.00

Trend Micro
TROJ_GEN.R021C0DKA15
10.465.09

VIPRE Antivirus
Trojan.Win32.Generic
45760

ViRobot
Trojan.Win32.Z.Banbra.12288.A[h]
2014.3.20.0

File size:
12 KB (12,288 bytes)

Product version:
1.0.0.0

Original file name:
MyPh.exe

File type:
Executable application (Win64 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\flashplayer_update.exe

File PE Metadata
Compilation timestamp:
10/11/2015 10:24:08 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
80.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
192:dN2zj+fuQJDIOFvsxmwEVIREqFIW1YPZ/Qw066oZg5NLX:dN8a9DxsMdOREqkZ/Qw066ou5V

Entry address:
0x44AA

Entry point:
4D, 5A, 90, 00, 03, 00, 00, 00, 04, 00, 00, 00, FF, FF, 00, 00, B8, 00, 00, 00, 00, 00, 00, 00, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 80, 00, 00, 00, 0E, 1F, BA, 0E, 00, B4, 09, CD, 21, B8, 01, 4C, CD, 21, 54, 68, 69, 73, 20, 70, 72, 6F, 67, 72, 61, 6D, 20, 63, 61, 6E, 6E, 6F, 74, 20, 62, 65, 20, 72, 75, 6E, 20, 69, 6E, 20, 44, 4F, 53, 20, 6D, 6F, 64, 65, 2E, 0D, 0D, 0A, 24, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Code size:
9.5 KB (9,728 bytes)

The file flashplayer_update.exe has been seen being distributed by the following URL.

Remove flashplayer_update.exe - Powered by Reason Core Security