init.exe

The executable init.exe has been detected as malware by 3 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘SessionInit’. While running, it connects to the Internet address srv12-mx-st.jino.ru on port 25.
MD5:
e4aa6dd92781f70f22c0a01b4074aa97

SHA-1:
038142f04cdeda89890450a8740bd97a0ca5eaee

SHA-256:
b43a2c062aeb7643d385ad44ce78661b4b72288469a6cda67f4dfc953a3fa9ae

Scanner detections:
3 / 68

Status:
Malware

Analysis date:
12/24/2024 4:16:47 PM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Trojan.Ramnit-1847
0.98/23143

Dr.Web
Trojan.Spambot.9653
9.0.1.05190

F-Secure
Win32.Ramnit
5.16.24

File size:
83.5 KB (85,504 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\administrator\init.exe

File PE Metadata
Compilation timestamp:
4/27/2004 10:06:14 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

Entry address:
0x19000

Entry point:
60, E8, 00, 00, 00, 00, 5D, 8B, C5, 81, ED, 32, 6F, 01, 20, 2B, 85, 50, 72, 01, 20, 89, 85, 4C, 72, 01, 20, B0, 00, 86, 85, 9E, 74, 01, 20, 3C, 01, 0F, 85, DE, 02, 00, 00, 8B, 85, 4C, 72, 01, 20, 2B, 85, 58, 72, 01, 20, 8B, 00, 89, 85, EA, 73, 01, 20, 8B, 85, 4C, 72, 01, 20, 2B, 85, 5C, 72, 01, 20, 8B, 00, 89, 85, F2, 73, 01, 20, 83, BD, F2, 73, 01, 20, 00, 0F, 84, A9, 02, 00, 00, 83, BD, EA, 73, 01, 20, 00, 0F, 84, 9C, 02, 00, 00, 8D, 85, 8D, 74, 01, 20, 50, FF, 95, EA, 73, 01, 20, 83, F8, 00, 0F, 84, 86...
 
[+]

Packer / compiler:
ASPack v1.08.04

Code size:
28 KB (28,672 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
SessionInit

Command:
C:\users\administrator\init.exe


The executing file has been seen to make the following network communications in live environments.

TCP (SMTP):
Connects to MX01.NICMAIL.ru  (194.85.88.238:25)

TCP (SMTP):
Connects to mail1.namebrightmail.com  (216.87.78.68:25)

TCP (SMTP):
Connects to wispsolutions1.dedicated.co.za  (197.242.149.137:25)

TCP (SMTP):
Connects to web80.meebox.net  (77.66.117.80:25)

TCP (SMTP):
Connects to web224.dnchosting.com  (199.7.108.224:25)

TCP (SMTP):
Connects to tk2-230-24732.vs.sakura.ne.jp  (160.16.108.236:25)

TCP (SMTP):
Connects to static-213-115-28-34.sme.bredbandsbolaget.se  (213.115.28.34:25)

TCP (SMTP):
Connects to srv12-mx-st.jino.ru  (217.107.34.202:25)

TCP (SMTP):
Connects to smtp-in-114.livemail.co.uk  (213.171.216.114:25)

TCP (SMTP):
Connects to shared894213152.clausweb.ro  (89.42.13.152:25)

TCP (SMTP):
Connects to server73.appriver.com  (204.232.236.144:25)

TCP (SMTP):
Connects to server-52-85-151-229.hkg51.r.cloudfront.net  (52.85.151.229:25)

TCP (SMTP):
Connects to serv-10654.ewdhosting.com  (66.71.251.154:25)

TCP (SMTP):
Connects to securemail.ngtnet.net  (104.207.30.239:25)

TCP (SMTP):
Connects to s206.web-hosting.com  (198.54.114.145:25)

TCP (SMTP):
Connects to romeo3.colo-wv.ntelos.net  (216.12.96.124:25)

TCP (SMTP):
Connects to relay6.hosting.reg.ru  (31.31.194.100:25)

TCP (SMTP):
Connects to relay.zaural.ru  (85.233.130.66:25)

TCP (SMTP):
Connects to redirect.ovh.net  (213.186.33.5:25)

TCP (SMTP):
Connects to plymouth.acenet.us  (68.171.217.98:25)

Remove init.exe - Powered by Reason Core Security