hao123toy-egypt.exe

hao123 Desktop Shortcut

Beijing baidu Netcom science and technology co.ltd

The application hao123toy-egypt.exe by Beijing baidu Netcom science and technology co.ltd has been detected as a potentially unwanted program by 2 anti-malware scanners.
Publisher:
Baidu.com  (signed by Beijing baidu Netcom science and technology co.ltd)

Product:
hao123 Desktop Shortcut

Version:
1.0.0.111

MD5:
85a74444edb17e776a74b44ff6c23d79

SHA-1:
c94acdab6a18e2b50356eb5c299b5aac667ad6f5

SHA-256:
ed106d71210307336e3ce70b311b7637c7403b954ce39d3473036ce1875c6cb1

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 2:10:27 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Hao123.C potentially unwanted application
7.0.302.0

Reason Heuristics
PUP.Hao123.ShrtCt.Meta (M)
16.4.24.12

File size:
1.5 MB (1,545,544 bytes)

Product version:
1.0.0.111

Copyright:
(C) 2011 Baidu.com。All Rights Reserved.

Original file name:
hao123.exe

File type:
Executable application (Win32 EXE)

Language:
Chinese (Simplified, PRC)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\hao123toy-egypt.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/27/2012 3:00:00 AM

Valid to:
2/27/2015 2:59:59 AM

Subject:
CN=Beijing baidu Netcom science and technology co.ltd, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Beijing baidu Netcom science and technology co.ltd, L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
56659719569BE07B775A1B2275E2D83A

File PE Metadata
Compilation timestamp:
8/18/2014 8:54:27 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:trMxDV546RyRCUXt+wBNC98vmMUW1tslAHAgqf6dC6hulfcr2f2bX4YeR4XCVEDh:02XtZEbfcrfX8R4XeeZZZ

Entry address:
0x6A88B

Entry point:
E8, DB, C4, 00, 00, E9, 79, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 57, 56, E8, BC, AF, FF, FF, 33, FF, 59, 3B, F7, 75, 1D, E8, 4A, 1F, 00, 00, 57, 57, 57, 57, 57, C7, 00, 16, 00, 00, 00, E8, 35, B2, FF, FF, 83, C4, 14, 83, C8, FF, EB, 34, 39, 7D, 0C, 74, DE, B9, FF, FF, FF, 7F, C7, 45, EC, 49, 00, 00, 00, 89, 75, E8, 89, 75, E0, 89, 4D, E4, 3B, C1, 77, 03, 89, 45, E4, FF, 75, 14, 8D, 45, E0, FF, 75, 10, FF, 75, 0C, 50, FF, 55, 08, 83, C4, 10, 5F, C9, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 8D, 45, 10...
 
[+]

Entropy:
5.5222

Code size:
543.5 KB (556,544 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-50-149-163.deploy.static.akamaitechnologies.com  (23.50.149.163:80)

TCP (HTTP):
Connects to host-213.158.175.98.tedata.net  (213.158.175.98:80)

TCP (HTTP):
Connects to host-213.158.175.120.tedata.net  (213.158.175.120:80)

TCP (HTTP):
Connects to a95-100-242-113.deploy.akamaitechnologies.com  (95.100.242.113:80)

TCP (HTTP):
Connects to a92-123-180-129.deploy.akamaitechnologies.com  (92.123.180.129:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

Remove hao123toy-egypt.exe - Powered by Reason Core Security