install_flashplayer12x32_x64mssd_aaa_aih.exe

The executable install_flashplayer12x32_x64mssd_aaa_aih.exe has been detected as malware by 32 anti-virus scanners. The program is a setup application that uses the Self-extracting archive installer, however the file is not signed with an authenticode signature from a trusted source. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server.
MD5:
629407001e997f1dd248ba5f1f29a9d6

SHA-1:
2c58e55f6974e19fee8e18fcd499cfcc3438b685

SHA-256:
2d5929359ed782f9169d17910b1ddff9ebe3305a3c52b393af67f2ff8b5f53c6

Scanner detections:
32 / 68

Status:
Malware

Analysis date:
11/30/2024 10:26:02 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.56278
224

Avira AntiVirus
TR/Malagent.A.22938
8.3.2.4

Arcabit
Trojan.Strictor.DDBD6
1.0.0.629

avast!
Win32:Malware-gen
2014.9-160625

AVG
Luhe.Fiha.A
2017.0.2702

Baidu Antivirus
Trojan.Win32.Autoit
4.0.3.16625

Bitdefender
Gen:Variant.Strictor.56278
1.0.20.885

Comodo Security
UnclassifiedMalware
23785

Dr.Web
Trojan.Inject1.41704
9.0.1.0177

Emsisoft Anti-Malware
Gen:Variant.Strictor.56278
8.16.06.25.04

ESET NOD32
RAR/Agent.AA
10.12738

Fortinet FortiGate
W32/Zbot.ALG!tr
6/25/2016

F-Secure
Gen:Variant.Strictor.52721
11.2016-25-06_7

G Data
Gen:Variant.Strictor.56278
16.6.25

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.9.5.0

K7 AntiVirus
Trojan
13.212.18131

Kaspersky
Trojan.Win32.Autoit
14.0.0.4

Malwarebytes
Trojan.Agent.AI
v2016.06.25.04

McAfee
Artemis!629407001E99
5600.6358

Microsoft Security Essentials
Trojan:Win32/Malagent!gmb
1.1.12400.0

MicroWorld eScan
Gen:Variant.Strictor.56278
17.0.0.531

NANO AntiVirus
Trojan.Win32.Agent.cvbtft
1.0.10.5081

nProtect
Generic.Starter.3.D8B99CBF
15.12.17.01

Panda Antivirus
Trj/CI.A
16.06.25.04

Quick Heal
TrojanPWS.AutoIt.Zbot.D
6.16.14.00

Rising Antivirus
PE:Malware.Generic/QRS!1.9E2D [F]
23.00.65.16623

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_SPNR.0BD514
7.2.177

Trend Micro
TROJ_SPNR.0BD514
10.465.25

VIPRE Antivirus
Trojan.Win32.Generic
45902

ViRobot
Trojan.Win32.S.Agent.1254360[h]
2014.3.20.0

Zillya! Antivirus
Worm.VBNA.Win32.255138
2.0.0.2569

File size:
1.2 MB (1,254,360 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Self-extracting archive

Common path:
C:\users\{user}\downloads\install_flashplayer12x32_x64mssd_aaa_aih.exe

File PE Metadata
Compilation timestamp:
8/22/2013 4:00:50 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:Nt24gH9V6dW4j2+NIA02Tfu+f41YbW162u/NLL6N3Ox:pQ6ogb02TrlJ/NnSex

Entry address:
0x1D348

Entry point:
E8, F0, 57, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 05, FD, FF, FF, C7, 06, F4, 81, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, F4, 81, 42, 00, E9, BA, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, F4, 81, 42, 00, E8, A7, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, CD, C9, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Entropy:
7.9076  (probably packed)

Code size:
148.5 KB (152,064 bytes)

The file install_flashplayer12x32_x64mssd_aaa_aih.exe has been seen being distributed by the following URL.

Remove install_flashplayer12x32_x64mssd_aaa_aih.exe - Powered by Reason Core Security