insall_flash_playerx210.exe

The executable insall_flash_playerx210.exe has been detected as malware by 23 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from docs.google.com and multiple other hosts.
MD5:
6d18bba42e8640217ddec7cb47d8e139

SHA-1:
8a023a33a0fe650c13e61a004b2d3e74be48858e

SHA-256:
dfb848c88ec0cca7a438816734f44512360e0f0321ea8ba8dbc4a1fda4613fde

Scanner detections:
23 / 68

Status:
Malware

Analysis date:
11/27/2024 6:54:45 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.64312
756

AhnLab V3 Security
Trojan/Win32.Spnr
2015.01.10

Avira AntiVirus
TR/Dldr.Agent.357888.29
7.11.200.102

avast!
Win32:Malware-gen
2014.9-150110

AVG
Luhe.Fiha.A
2016.0.3234

Baidu Antivirus
Trojan.Win32.Generic
4.0.3.15110

Bitdefender
Gen:Variant.Strictor.64312
1.0.20.50

Emsisoft Anti-Malware
Gen:Variant.Strictor.64312
8.15.01.10.11

ESET NOD32
Win32/TrojanDownloader.Autoit.NWO (variant)
9.10989

Fortinet FortiGate
W32/Autoit.NWO!tr.dldr
1/10/2015

F-Secure
Gen:Variant.Strictor.64312
11.2015-10-01_7

G Data
Gen:Variant.Strictor.64312
15.1.24

IKARUS anti.virus
Trojan-Downloader.Win32.AutoIt
t3scan.1.8.6.0

K7 AntiVirus
Trojan-Downloader
13.190.14596

Kaspersky
HEUR:Trojan-Downloader.Win32.Generic
14.0.0.2663

Malwarebytes
Trojan.Agent.ADPGen
v2015.01.10.11

McAfee
Artemis!6D18BBA42E86
5600.6890

MicroWorld eScan
Gen:Variant.Strictor.64312
16.0.0.30

Norman
Troj_Generic.XZELT
11.20150110

Qihoo 360 Security
HEUR/QVM11.1.Malware.Gen
1.0.0.1015

Sophos
Mal/Generic-S
4.98

Total Defense
Win32/Tnega.SJFWJCC
37.0.11376

Trend Micro House Call
TROJ_GEN.R047H09A815
7.2.10

File size:
349.5 KB (357,888 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United Kingdom)

Common path:
C:\users\{user}\downloads\insall_flash_playerx210.exe

File PE Metadata
Compilation timestamp:
1/7/2015 7:32:09 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:J+ssXv5jUA2OpjesAOfoTb+v+90TveVBciZnbCUxP4C9tgf/AN1LtdReCBJJKKrO:/Ov5jKhsfoPA+yeVKUCUxP4C902bdRtK

Entry address:
0xDAEE0

Entry point:
60, BE, 00, 70, 48, 00, 8D, BE, 00, A0, F7, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Entropy:
7.9157

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
340 KB (348,160 bytes)

The file insall_flash_playerx210.exe has been seen being distributed by the following 4 URLs.

Remove insall_flash_playerx210.exe - Powered by Reason Core Security