hermesclientinstall_1.9.24_broadmedia.exe

The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from wiki.cdnetworks.com.
MD5:
e12884316b6addfc358cc2dc856e585b

SHA-1:
05b5447ef27363f0d7330f7a8fb6537857019c1c

SHA-256:
55d442e43e3efc5230935cd2aee665840b70640c1140347919234d50eb037cb7

Scanner detections:
2 / 68

Status:
Clean  (2 probable false positive detections)

Explanation:
These detections are probably false positives (erroneous), the file is probably malware free.

Analysis date:
12/27/2024 5:45:49 AM UTC  (today)

Scan engine
Detection
Engine version

Trend Micro House Call
TROJ_GE.32BD883C
7.2.142

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.0

File size:
7 MB (7,369,391 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\hermesclientinstall_1.9.24_broadmedia.exe

File PE Metadata
Compilation timestamp:
8/26/2007 1:16:09 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:BKz100dhYmwpjJIwjSris4ZTuaSWTF0RL1cGrg8qxtyWHz/6SdZyD3etYuPkSo/s:Ez100fYRphWruTuaboDCJHlyDYjKP7pm

Entry address:
0x30FB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, C8, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, D4, EC, 42, 00, E8, D4, 2A, 00, 00, A3, 24, EC, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 48, 90, 42, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, 20, E4, 42, 00, E8, 8B, 27, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 79, 27, 00, 00...
 
[+]

Entropy:
7.9992

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file hermesclientinstall_1.9.24_broadmedia.exe has been seen being distributed by the following URL.

Scan hermesclientinstall_1.9.24_broadmedia.exe - Powered by Reason Core Security