mzlekgcqu.exe

Yu Bao

The executable mzlekgcqu.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from dgkytklfjrqkb.cloudfront.net. While running, it connects to the Internet address server-54-192-29-180.dub2.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yu Bao  (signed and verified)

MD5:
b96c4f0f0be7c27232982ad68b8280d1

SHA-1:
26d5b603631c94912a4c67a85b9f268e0ee6aa4b

SHA-256:
fc6abe5d3f031ac7e4b8951f9cbf24110e0c6b67e1fcf34943e073e9362be809

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/24/2024 7:42:30 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.10.16

File size:
401.5 KB (411,120 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\mzlekgcqu.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/22/2017 4:00:00 PM

Valid to:
11/21/2017 3:59:59 PM

Subject:
CN=Yu Bao, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
7EFDCDBDDDD82397B41ECF4BAAD4DA22

File PE Metadata
Compilation timestamp:
2/9/2017 2:29:37 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x88EF

Entry point:
E8, D0, F3, FF, FF, E9, 99, 2B, 00, 00, 33, C0, 50, 50, 6A, 03, 50, 6A, 03, 68, 00, 00, 00, 40, 68, 0C, F5, 45, 00, FF, 15, 24, B0, 45, 00, A3, 70, 1E, 46, 00, C3, 55, 8B, EC, 83, EC, 0C, 53, 8B, 5D, 08, 56, 8B, F3, 83, E6, 1F, F6, C3, 08, 74, 16, F6, 45, 10, 01, 74, 10, 6A, 01, E8, F7, 91, FF, FF, 59, 83, E6, F7, E9, 90, 01, 00, 00, F6, C3, 04, 74, 16, F6, 45, 10, 04, 74, 10, 6A, 04, E8, DC, 91, FF, FF, 59, 83, E6, FB, E9, 75, 01, 00, 00, F6, C3, 01, 0F, 84, 9A, 00, 00, 00, F6, 45, 10, 08, 0F, 84, 90, 00...
 
[+]

Entropy:
7.8209  (probably packed)

Code size:
359 KB (367,616 bytes)

The file mzlekgcqu.exe has been seen being distributed by the following URL.

http://dgkytklfjrqkb.cloudfront.net/.../yomz.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-85-63-135.lhr50.r.cloudfront.net  (52.85.63.135:80)

TCP (HTTP):
Connects to server-54-230-11-213.lhr3.r.cloudfront.net  (54.230.11.213:80)

TCP (HTTP):
Connects to server-54-192-29-102.dub2.r.cloudfront.net  (54.192.29.102:80)

TCP (HTTP):
Connects to server-54-192-29-66.dub2.r.cloudfront.net  (54.192.29.66:80)

TCP (HTTP):
Connects to server-52-85-77-242.lax3.r.cloudfront.net  (52.85.77.242:80)

TCP (HTTP):
Connects to server-52-85-63-93.lhr50.r.cloudfront.net  (52.85.63.93:80)

TCP (HTTP):
Connects to server-52-85-221-95.cdg50.r.cloudfront.net  (52.85.221.95:80)

TCP (HTTP):
Connects to server-52-85-221-85.cdg50.r.cloudfront.net  (52.85.221.85:80)

TCP (HTTP):
Connects to server-52-85-221-71.cdg50.r.cloudfront.net  (52.85.221.71:80)

TCP (HTTP):
Connects to server-52-85-221-58.cdg50.r.cloudfront.net  (52.85.221.58:80)

TCP (HTTP):
Connects to server-52-85-221-33.cdg50.r.cloudfront.net  (52.85.221.33:80)

TCP (HTTP):
Connects to server-54-192-29-228.dub2.r.cloudfront.net  (54.192.29.228:80)

TCP (HTTP):
Connects to server-54-192-29-130.dub2.r.cloudfront.net  (54.192.29.130:80)

TCP (HTTP):
Connects to server-52-85-63-250.lhr50.r.cloudfront.net  (52.85.63.250:80)

TCP (HTTP):
Connects to server-52-85-63-244.lhr50.r.cloudfront.net  (52.85.63.244:80)

TCP (HTTP):
Connects to server-52-84-63-112.ord51.r.cloudfront.net  (52.84.63.112:80)

TCP (HTTP):
Connects to server-54-230-187-252.cdg51.r.cloudfront.net  (54.230.187.252:80)

TCP (HTTP):
Connects to server-54-230-187-206.cdg51.r.cloudfront.net  (54.230.187.206:80)

TCP (HTTP):
Connects to server-54-230-187-190.cdg51.r.cloudfront.net  (54.230.187.190:80)

TCP (HTTP):
Connects to server-54-230-187-186.cdg51.r.cloudfront.net  (54.230.187.186:80)

Remove mzlekgcqu.exe - Powered by Reason Core Security