jump hotkey+rato voador.exe

The executable jump hotkey+rato voador.exe has been detected as malware by 3 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from fs11n1.sendspace.com.
MD5:
5267ebcca176d0900e5f4ce0692bf3f7

SHA-1:
fe13970c253cf9129365d0b36233460fb507a237

SHA-256:
8efff3081f66a0a66facdf220c30a7700824414b3aa491370c25055496f31596

Scanner detections:
3 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
11/24/2024 9:42:50 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:RmnDrp
160518-2

ESET NOD32
Win32/Ramnit.A virus
8.0.319.0

F-Prot
W32/Ramnit.B!Generic
4.6.5.141

File size:
3.7 MB (3,848,704 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\jump hotkey+rato voador.exe

File PE Metadata
Compilation timestamp:
6/28/2013 11:45:44 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:XH0wG7cxnbd/zFAW4Ri6m/Zp8WFjel1H8YfdYvNwagk:+7cxZWm/jSH8YFYN5g

Entry address:
0x3A2000

Entry point:
60, E8, 00, 00, 00, 00, 5D, 8B, C5, 81, ED, 32, 6F, 01, 20, 2B, 85, 50, 72, 01, 20, 89, 85, 4C, 72, 01, 20, B0, 00, 86, 85, 9E, 74, 01, 20, 3C, 01, 0F, 85, DE, 02, 00, 00, 8B, 85, 4C, 72, 01, 20, 2B, 85, 58, 72, 01, 20, 8B, 00, 89, 85, EA, 73, 01, 20, 8B, 85, 4C, 72, 01, 20, 2B, 85, 5C, 72, 01, 20, 8B, 00, 89, 85, F2, 73, 01, 20, 83, BD, F2, 73, 01, 20, 00, 0F, 84, A9, 02, 00, 00, 83, BD, EA, 73, 01, 20, 00, 0F, 84, 9C, 02, 00, 00, 8D, 85, 8D, 74, 01, 20, 50, FF, 95, EA, 73, 01, 20, 83, F8, 00, 0F, 84, 86...
 
[+]

Packer / compiler:
ASPack v1.08.04

Code size:
35.5 KB (36,352 bytes)

The file jump hotkey+rato voador.exe has been seen being distributed by the following URL.

Remove jump hotkey+rato voador.exe - Powered by Reason Core Security