katakanaamber.exe

超霸传奇微端

Chengdu Jinding Shengshi Network Technology Co., Ltd.

The executable katakanaamber.exe has been detected as malware by 1 anti-virus scanner. It runs as a windows Service named “AmberKatakana”.
Product:
超霸传奇微端

Description:
超霸传奇登录器

Version:
2.0.0.0

MD5:
8a51e222272dfa5672108b877c04faa4

SHA-1:
341d3a15d6fe0cbf93c4f80005308865294656b9

SHA-256:
37eff8c6f084aec26197bf4d9fb2ef23aebc0c0fcaedd0855b39811d12fb5460

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/24/2024 6:49:42 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.3.2.13

File size:
282.8 KB (289,576 bytes)

Product version:
2.0.0.0

Copyright:
Copyright (C) 2016

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\commandkatakana\katakanaamber.exe

Digital Signature
Authority:
WoSign CA Limited

Valid from:
7/3/2015 3:48:49 PM

Valid to:
7/3/2017 3:48:49 PM

Subject:
CN="Chengdu Jinding Shengshi Network Technology Co., Ltd.", O="Chengdu Jinding Shengshi Network Technology Co., Ltd.", L=Chengdu, S=Sichuan, C=CN

Issuer:
CN=WoSign Class 3 Code Signing CA G2, O=WoSign CA Limited, C=CN

Serial number:
69E4A4B19E707DAADE6C98BAC000AC8B

File PE Metadata
Compilation timestamp:
7/29/2016 12:43:49 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

Entry address:
0xA0100

Entry point:
60, BE, 00, 30, 46, 00, 8D, BE, 00, E0, F9, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Entropy:
7.8132

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
248 KB (253,952 bytes)

Service
Display name:
AmberKatakana

Service name:
CommandAmber

Type:
Win32OwnProcess, InteractiveProcess


Remove katakanaamber.exe - Powered by Reason Core Security