gemsswap2.exe

Gekkon Ltd

The application gemsswap2.exe by Gekkon has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address virtualbookstores.net on port 80 using the HTTP protocol.
Publisher:
GamesPub Ltd.  (signed by Gekkon Ltd)

Version:
1.0.0.1

MD5:
af76bc7002dbf7074791776ebf3dfbb1

SHA-1:
9cd760719ca618625e036c812f99192aae064c25

SHA-256:
fbb04ec829fd10923f1722afd9df4e1d3b7a3cc96226f4e6e33a575dcda21f16

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/5/2024 7:39:39 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Gekkon (M)
16.1.21.19

File size:
1.7 MB (1,745,488 bytes)

Product version:
1.0.0.1

Copyright:
(c) GamesPub Ltd. All rights reserved.

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\toomkygames.com\gems swap 2\gemsswap2.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
8/9/2010 2:35:50 PM

Valid to:
8/9/2013 2:35:46 PM

Subject:
E=is@newfreescreensavers.com, CN=Gekkon Ltd, O=Gekkon Ltd, L=Mahe, S=Seychelles, C=SC

Issuer:
CN=GlobalSign ObjectSign CA, OU=ObjectSign CA, O=GlobalSign nv-sa, C=BE

Serial number:
0100000000012A56A1781E

File PE Metadata
Compilation timestamp:
8/2/2012 6:21:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:HhzMRmxpHjtKJah8/0oi86CaM15W3VIC7/nn/usUf9EOwrED49W:FMRmxpjSah8vi86CaM15W3VISmsUfqOq

Entry address:
0x101AC8

Entry point:
E8, 0B, 6B, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, A0, FC, 56, 00, 75, 02, F3, C3, E9, 92, 6B, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 61, 83, 7D, 08, 00, 75, 13, E8, 56, 12, 00, 00, 6A, 16, 5E, 89, 30, E8, FC, 6D, 00, 00, 8B, C6, EB, 48, 83, 7D, 10, 00, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, 5E, 1C, 00, 00, 83, C4, 0C, EB, C7, FF, 75, 0C, 6A, 00, FF, 75, 08, E8, DC, 19, 00, 00, 83, C4, 0C, 83, 7D, 10, 00, 74, BB, 39, 75, 0C, 73, 0E, E8, 0C, 12, 00, 00, 6A...
 
[+]

Code size:
1.1 MB (1,199,104 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to virtualbookstores.net  (198.44.66.74:80)

TCP (HTTP):
Connects to 94.31.29.96.IPYX-077437-ZYO.above.net  (94.31.29.96:80)

TCP (HTTP SSL):
Connects to wb-in-f154.1e100.net  (66.102.1.154:443)

TCP (HTTP SSL):
Connects to host-62-24-208-172.as13285.net  (62.24.208.172:443)

TCP (HTTP SSL):
Connects to 201-048-053-053.static.ctbc.com.br  (201.48.53.53:443)

Remove gemsswap2.exe - Powered by Reason Core Security