msdn.exe

The executable msdn.exe has been detected as malware by 35 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Keyboard Inf.’. While running, it connects to the Internet address cf-190-93-243-15.cloudflare.com on port 80 using the HTTP protocol.
MD5:
760924319c93633bc9ddfdbc85f02a88

SHA-1:
1854b91dce95267172a83f524a48eeacd8d79d08

SHA-256:
07818576b0255ccce8eef7c332d5cd0a9f5a2cf313c30788c799f72a6ec9dc80

Scanner detections:
35 / 68

Status:
Malware

Analysis date:
11/27/2024 11:26:33 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.70014
800

AegisLab AV Signature
Troj.W32.Gen
2.1.4+

Agnitum Outpost
Trojan.FakeWarn
7.1.1

AhnLab V3 Security
Trojan/Win32.FakeWarn
2014.10.18

Avira AntiVirus
TR/Fakewarn.C.1
7.11.179.110

avast!
Win32:Malware-gen
2014.9-141126

AVG
Generic35
2015.0.3278

Baidu Antivirus
Trojan.Win32.CoinMiner
4.0.3.141126

Bitdefender
Gen:Variant.Zusy.70014
1.0.20.1650

Bkav FE
W32.Clod746.Trojan
1.3.0.4959

Comodo Security
UnclassifiedMalware
19829

Dr.Web
Trojan.BtcMine.206
9.0.1.0330

Emsisoft Anti-Malware
Gen:Variant.Zusy.70014
8.14.11.26.01

ESET NOD32
Win32/CoinMiner.JX (variant)
8.10581

Fortinet FortiGate
W32/FakeWarn.PGK!tr
11/26/2014

F-Secure
Gen:Variant.Zusy.70014
11.2014-26-11_4

G Data
Gen:Variant.Zusy.70014
14.11.24

IKARUS anti.virus
Trojan.CoinMiner
t3scan.1.7.8.0

K7 AntiVirus
Trojan
13.184.13718

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.2887

Malwarebytes
Backdoor.Bot
v2014.11.26.01

McAfee
Artemis!760924319C93
5600.6934

Microsoft Security Essentials
Trojan:Win32/Tarcloin.J
1.11005

MicroWorld eScan
Gen:Variant.Zusy.70014
15.0.0.990

NANO AntiVirus
Trojan.Win32.BtcMine.cstiwa
0.28.2.62671

Norman
Troj_Generic.RBPQP
11.20141126

Qihoo 360 Security
HEUR/Malware.QVM05.Gen
1.0.0.1015

Quick Heal
Trojan.Malagent.g5
11.14.14.00

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_SPNV.01KA13
7.2.330

Trend Micro
TROJ_SPNV.01KA13
10.465.26

Vba32 AntiVirus
Trojan.FakeWarn
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
34020

ViRobot
Trojan.Win32.A.FakeWarn.3344384
2011.4.7.4223

Zillya! Antivirus
Trojan.CoinMiner.Win32.545
2.0.0.1958

File size:
3.2 MB (3,344,384 bytes)

File type:
Executable application (Win32 EXE)

Language:
Turkish (Turkey)

Common path:
C:\users\{user}\appdata\roaming\mozilla\msdn.exe

File PE Metadata
Compilation timestamp:
10/23/2013 3:08:14 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.50

CTPH (ssdeep):
98304:Dw1jX5XfqnQCANmCCVzr7yWUIU0o1uGoso:QX5XfqVYsX7O0CDoso

Entry address:
0x1000

Entry point:
68, CC, 01, 00, 00, 68, 00, 00, 00, 00, 68, 98, 26, 41, 00, E8, A6, 80, 00, 00, 83, C4, 0C, 68, 00, 00, 00, 00, E8, 9F, 80, 00, 00, A3, 9C, 26, 41, 00, 68, 00, 00, 00, 00, 68, 00, 10, 00, 00, 68, 00, 00, 00, 00, E8, 8C, 80, 00, 00, A3, 98, 26, 41, 00, E8, BC, A7, 00, 00, E8, 70, A6, 00, 00, E8, 22, 99, 00, 00, E8, 5C, 92, 00, 00, E8, C8, 8C, 00, 00, E8, 93, 8A, 00, 00, E8, C0, 80, 00, 00, C7, 05, 01, E0, 40, 00, 06, 00, 00, 02, E8, DF, A7, 00, 00, 50, 68, 86, F3, 40, 00, E8, 42, 6C, 00, 00, 68, A4, 26, 41...
 
[+]

Packer / compiler:
PKLITE32, 0x1.1

Code size:
43.5 KB (44,544 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Keyboard Inf.

Command:
C:\users\{user}\appdata\roaming\mozilla\msdn.exe


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cf-190-93-243-15.cloudflare.com  (190.93.243.15:80)

Remove msdn.exe - Powered by Reason Core Security