interhop.exe

Xiaodong Wang

The application interhop.exe by Xiaodong Wang has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a windows Service named “InterHop”. While running, it connects to the Internet address server-54-230-141-58.sfo5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Xiaodong Wang  (signed and verified)

MD5:
659a14ad4d5258812722c9ce0d2b7c40

SHA-1:
d7c0295d91cfb243a3f296b0566cf074495872ec

SHA-256:
fcebc5170e44ffa5d9c20ec833016137b9875a7428aa812b891d4b0d3ddd2788

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/6/2024 10:33:24 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.InterHop (M)
16.9.21.13

File size:
399.7 KB (409,320 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\interhop\interhop.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
9/20/2016 5:00:00 PM

Valid to:
8/8/2017 4:59:59 PM

Subject:
CN=Xiaodong Wang, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
7EAB916E1AD722DAA745B3DB40B4B049

File PE Metadata
Compilation timestamp:
9/20/2016 7:33:44 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

CTPH (ssdeep):
6144:nzjLhO+zwEBGpBSRwtglXXWayHh8Bz0AUbfUjqTorKDFBcDMfiuRNw5rY4B3:1aEXosXf+AoAU4xrKDbNw5r93

Entry address:
0x9E098

Entry point:
60, C7, 44, 24, 1C, 69, 1A, 73, E6, 55, 66, 89, 34, 24, C7, 44, 24, 1C, 78, 99, 23, 76, 9C, 60, 8D, 64, 24, 40, E9, 97, 2B, 05, 00, 80, F6, 57, 66, 89, FA, 9C, 89, 45, D8, C0, E6, 03, 66, 0F, BA, FA, 04, 66, C1, EA, 0B, 0F, BB, CA, 89, 45, EC, F7, DA, 9C, 2D, 01, 00, 00, 00, 66, D3, FA, 66, 0F, AB, D2, 66, FF, CA, 89, 45, E8, 0F, 31, F9, 68, 3D, 5D, 24, 1A, FE, C0, 89, FA, 68, 66, 88, FD, 67, 66, 0F, AB, F8, 2B, 55, 0C, 66, 0F, BA, E5, 0A, 66, A9, 9C, 97, 83, E2, 03, 27, FF, 74, 24, 08, 89, C8, F9, 66, 0F...
 
[+]

Entropy:
7.9440  (probably packed)

Code size:
275 KB (281,600 bytes)

Service
Display name:
InterHop

Type:
Win32OwnProcess, InteractiveProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-163-197.jax1.r.cloudfront.net  (54.230.163.197:80)

TCP (HTTP):
Connects to server-52-85-63-20.lhr50.r.cloudfront.net  (52.85.63.20:80)

TCP (HTTP):
Connects to server-54-230-11-184.lhr3.r.cloudfront.net  (54.230.11.184:80)

TCP (HTTP):
Connects to server-54-230-95-8.fra2.r.cloudfront.net  (54.230.95.8:80)

TCP (HTTP):
Connects to server-52-85-63-211.lhr50.r.cloudfront.net  (52.85.63.211:80)

TCP (HTTP):
Connects to server-54-230-81-168.mia50.r.cloudfront.net  (54.230.81.168:80)

TCP (HTTP):
Connects to server-54-230-0-90.lhr5.r.cloudfront.net  (54.230.0.90:80)

TCP (HTTP):
Connects to server-54-230-0-36.lhr5.r.cloudfront.net  (54.230.0.36:80)

TCP (HTTP):
Connects to server-54-230-0-171.lhr5.r.cloudfront.net  (54.230.0.171:80)

TCP (HTTP):
Connects to server-52-85-83-189.lax1.r.cloudfront.net  (52.85.83.189:80)

TCP (HTTP):
Connects to server-54-230-216-218.mrs50.r.cloudfront.net  (54.230.216.218:80)

TCP (HTTP):
Connects to server-54-230-0-75.lhr5.r.cloudfront.net  (54.230.0.75:80)

TCP (HTTP):
Connects to server-54-230-0-111.lhr5.r.cloudfront.net  (54.230.0.111:80)

TCP (HTTP):
Connects to server-54-192-3-84.lhr5.r.cloudfront.net  (54.192.3.84:80)

TCP (HTTP):
Connects to server-54-192-3-124.lhr5.r.cloudfront.net  (54.192.3.124:80)

TCP (HTTP):
Connects to server-54-192-230-44.waw50.r.cloudfront.net  (54.192.230.44:80)

TCP (HTTP):
Connects to server-52-85-83-122.lax1.r.cloudfront.net  (52.85.83.122:80)

TCP (HTTP):
Connects to server-52-84-25-122.sea32.r.cloudfront.net  (52.84.25.122:80)

TCP (HTTP):
Connects to server-54-230-95-233.fra2.r.cloudfront.net  (54.230.95.233:80)

TCP (HTTP):
Connects to server-54-230-216-83.mrs50.r.cloudfront.net  (54.230.216.83:80)

Remove interhop.exe - Powered by Reason Core Security