mikrotik yemen contro x86.exe

MikrotiK Yemen Control

This is a setup and installation application. The file has been seen being downloaded from www.alwahdah-tr.com.
Publisher:
MikrotiK Yemen Control

Description:
MikrotiK Yemen Control 1.0.8 Installation

Version:
1.0.8

MD5:
0febdfa1c2c1ad21325fffe5df2f91b7

SHA-1:
99866b72f5666c8415b218524494a0c6e4446434

SHA-256:
7140b55121b9d52a0c6373625b939213885b08726e828f853b995599162b6c45

Scanner detections:
2 / 68

Status:
Clean  (2 probable false positive detections)

Explanation:
These detections are probably false positives (erroneous), the file is probably malware free.

Analysis date:
11/8/2024 10:40:36 AM UTC  (today)

Scan engine
Detection
Engine version

McAfee
Generic-FRAX!0FEBDFA1C2C1
5600.6623

Qihoo 360 Security
HEUR/QVM05.1.Malware.Gen
1.0.0.1015

File size:
7.4 MB (7,716,836 bytes)

Copyright:
MikrotiK Yemen Control

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\mikrotik yemen contro x86.exe

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
196608:avnOekw5aMokBWgpidttDrsBmztWihX8mkPqsQf3iLO1VQXK:S9rdWPdttDrsEhX8dStfSLO1V8K

Entry address:
0x19B64

Entry point:
55, 8B, EC, 83, C4, F0, B8, 9C, 9A, 41, 00, E8, B8, AB, FE, FF, B8, C4, 9B, 41, 00, E8, 5A, DC, FE, FF, 8B, 15, C8, A6, 41, 00, 89, 02, 8B, 15, C8, A6, 41, 00, 8B, 12, A1, CC, A6, 41, 00, E8, 48, D5, FF, FF, 8B, 15, C8, A6, 41, 00, 8B, 12, A1, 6C, A6, 41, 00, E8, 02, 71, FF, FF, A1, C8, A6, 41, 00, E8, 14, 18, FF, FF, E8, D7, 99, FE, FF, 00, 00, 00, FF, FF, FF, FF, 01, 00, 00, 00, 2A, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9966

Developed / compiled with:
Microsoft Visual C++

Code size:
99 KB (101,376 bytes)

The file mikrotik yemen contro x86.exe has been seen being distributed by the following URL.

Scan mikrotik yemen contro x86.exe - Powered by Reason Core Security