module prestashop slide_10924_i27650202_il345.exe

The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from downprov1.amber1graph.com and multiple other hosts.
MD5:
e1af3783d3cc96e8c25fbd3eabb3480e

SHA-1:
33247283bf433b42fded3a0db845fb9280b06ff2

SHA-256:
de462ee0cecfd4e0c31d48fef6ceaf6c68dd426d555c24c791f807905fe8ddf2

Scanner detections:
4 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
11/24/2024 12:17:06 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Amonetize
2015.02.02

Comodo Security
Application.Win32.LoadMoney.IARS
20932

Trend Micro House Call
Suspicious_GEN.F47V0201
7.2.33

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
37184

File size:
297.1 KB (304,247 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\documents and settings\administrateur.filmodex\mes documents\downloads\module prestashop slide_10924_i27650202_il345.exe

File PE Metadata
Compilation timestamp:
10/7/2014 4:40:20 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:9W+7+eMAKGmkDRTOsJ2tEf6eiLkRsEExOHc6ixuI:9RJSOBItECeiLkRsxOHc5uI

Entry address:
0x335A

Entry point:
81, EC, D8, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, 30, 92, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, BC, 70, 40, 00, 55, FF, 15, AC, 72, 40, 00, 6A, 09, A3, B8, 92, 42, 00, E8, 15, 2F, 00, 00, A3, 04, 92, 42, 00, 55, 8D, 44, 24, 38, 68, B4, 02, 00, 00, 50, 55, 68, A8, 06, 42, 00, FF, 15, 7C, 71, 40, 00, 68, 7C, 93, 40, 00, 68, 00, 82, 42, 00, E8, 80, 2B, 00, 00, FF, 15, 34, 71, 40, 00, BB, 00, 40, 43, 00, 50, 53, E8, 6E, 2B, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
24 KB (24,576 bytes)

The file module prestashop slide_10924_i27650202_il345.exe has been seen being distributed by the following 3 URLs.