mtkdroidtools_v247.exe

7-Zip

Igor Pavlov

The application mtkdroidtools_v247.exe has been detected as a potentially unwanted program by 20 anti-malware scanners. The program is a setup application that uses the 7z Setup installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from fileshare1280.depositfiles.org and multiple other hosts.
Publisher:
Igor Pavlov

Product:
7-Zip

Description:
7z SFX

Version:
9.20

MD5:
69a6a314b6e87b8beb54bf73a39446de

SHA-1:
43b31397c555e09334c93a1a5f7878bd690ad4cb

SHA-256:
c95bfc23fb67cf81c1eb2aad141833496d41c953be09e161519308629533451d

Scanner detections:
20 / 68

Status:
Potentially unwanted

Analysis date:
12/27/2024 9:35:26 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Trojan.Heur.EuW@Ysr08Sdi
1120

Avira AntiVirus
Android/GetRoot.A
7.11.122.170

avast!
ELF:Lootor-H [PUP]
2014.9-140110

Bkav FE
W32.Clodd2d.Trojan
1.3.0.4613

Comodo Security
UnclassifiedMalware
17517

Dr.Web
Android.Exploit.5
9.0.1.010

ESET NOD32
Android/Exploit.Lotoor.DH
8.9190

Fortinet FortiGate
Android/ZergRush.B!exploit
1/10/2014

F-Secure
Gen:Trojan.Heur.EuW@Ysr08Sdi
11.2014-10-01_6

IKARUS anti.virus
Trojan.Win32.Spy
t3scan.2.2.29

K7 AntiVirus
Riskware
13.174.10656

McAfee
Artemis!69A6A314B6E8
5600.7254

MicroWorld eScan
Gen:Trojan.Heur.EuW@Ysr08Sdi
15.0.0.30

NANO AntiVirus
Trojan.Win32.DroidRtC.bvwyju
0.28.0.57029

Norman
Suspicious_Gen4.EGTTW
11.20140110

Rising Antivirus
PE:Trojan.Injector!1.9DEE
23.00.65.14108

Sophos
Andr/DroidRt-C
4.96

Trend Micro House Call
TROJ_GEN.R0CBC0RHK13
7.2.10

Trend Micro
TROJ_GEN.R0CBC0RHK13
10.465.10

VIPRE Antivirus
Trojan.Win32.Generic
24874

File size:
7.1 MB (7,487,527 bytes)

Product version:
9.20

Copyright:
Copyright (c) 1999-2010 Igor Pavlov

Original file name:
7z.sfx.exe

File type:
Executable application (Win32 EXE)

Installer:
7z Setup

Language:
English (United States)

Common path:
C:\users\{user}\downloads\mtkdroidtools_v247.exe

File PE Metadata
Compilation timestamp:
11/18/2010 1:27:33 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:6Gg/ktllfiwjYyaig5Q0k/hk79vynFaRJD:6GUgLU1VZUAD

Entry address:
0x1D262

Entry point:
55, 8B, EC, 6A, FF, 68, 20, 1E, 42, 00, 68, 5C, D2, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, 04, 11, 42, 00, 59, 83, 0D, 90, BD, 42, 00, FF, 83, 0D, 94, BD, 42, 00, FF, FF, 15, 00, 11, 42, 00, 8B, 0D, 70, 9D, 42, 00, 89, 08, FF, 15, FC, 10, 42, 00, 8B, 0D, 6C, 9D, 42, 00, 89, 08, A1, 64, 11, 42, 00, 8B, 00, A3, 8C, BD, 42, 00, E8, 1C, 01, 00, 00, 39, 1D, 20, 7A, 42, 00, 75, 0C, 68, EA, D3, 41, 00, FF, 15, 0C, 11...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
124.5 KB (127,488 bytes)

The file mtkdroidtools_v247.exe has been seen being distributed by the following 4 URLs.

http://fileshare1280.depositfiles.org/auth-1471900823d6390569830a2f949b10bb-186.31.221.92-2659141945-145187821-guest/.../MtkDroidTools_v247.exe

Remove mtkdroidtools_v247.exe - Powered by Reason Core Security