new folder

The file new folder has been detected as a potentially unwanted program by 37 anti-malware scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘WirelessConfig’. While running, it connects to the Internet address text-lb.esams.wikimedia.org on port 443.
MD5:
a11f9f5c041bfd12f214d9fb9831bba8

SHA-1:
d66c06667552a49ce27a01b65bb373a1fef59643

SHA-256:
4c5a58090a900dd6e7aad2bea25492fd8f57ecf086f310f95c467fa7922850c7

Scanner detections:
37 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 1:36:14 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.471784
730

Agnitum Outpost
Trojan.DR.Dapato
7.1.1

AhnLab V3 Security
HEUR/Fakon.mwf
2015.01.13

Avira AntiVirus
TR/Patched.Gen
7.11.200.132

avast!
Win32:Malware-gen
2014.9-150205

AVG
Agent5
2016.0.3208

Baidu Antivirus
Trojan.Win32.Dapato
4.0.3.1525

Bitdefender
Gen:Variant.Kazy.471784
1.0.20.180

Bkav FE
W32.FakeW7Folder.Fam.Trojan
1.3.0.6267

Clam AntiVirus
Win.Trojan.Agent-803537
0.98/21511

Comodo Security
UnclassifiedMalware
20692

Dr.Web
Trojan.DownLoader11.18798
9.0.1.036

Emsisoft Anti-Malware
Gen:Variant.Kazy.471784
8.15.02.05.08

ESET NOD32
Win32/Agent.NPN (variant)
9.11004

Fortinet FortiGate
W32/Dapato.EDQU!tr
2/5/2015

F-Prot
W32/A-ac44fad2
v6.4.7.1.166

F-Secure
Gen:Variant.Kazy.471784
11.2015-05-02_5

G Data
Gen:Variant.Kazy.471784
15.2.24

IKARUS anti.virus
Worm.Win32.Agent
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.191.14617

Kaspersky
Trojan-Dropper.Win32.Dapato
14.0.0.2533

McAfee
Artemis!A11F9F5C041B
5600.6864

Microsoft Security Essentials
Worm:Win32/Goldrv.A
1.11302

MicroWorld eScan
Gen:Variant.Kazy.471784
16.0.0.108

NANO AntiVirus
Trojan.Win32.Dapato.dbzcxx
0.30.0.64448

Norman
Obfuscated.H!genr
11.20150205

nProtect
Trojan-Dropper/W32.Dapato.81920.J
15.01.12.01

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
TrojanDropper.Dapato.r5
2.15.14.00

Sophos
Troj/Wonton-MP
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Boaxxee
10072

Total Defense
Win32/FakeFLDR_i
37.0.11383

Trend Micro House Call
Mal_OtorunP
7.2.36

Trend Micro
Mal_OtorunP
10.465.05

Vba32 AntiVirus
TrojanDropper.Dapato
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
36608

Zillya! Antivirus
Virus.Virut.Win32.25
2.0.0.2033

File size:
80 KB (81,920 bytes)

File PE Metadata
Compilation timestamp:
7/5/2001 12:11:11 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:Q88OoVM1q8ewf1OO53i6EBXlLOUprqp3EKdfjqoAB3J:tpoG1zjdOOqLOUp2Wajqd3J

Entry address:
0x3C67

Entry point:
E8, 9C, 04, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, 81, 40, 00, 89, 0D, F4, 81, 40, 00, 89, 15, F0, 81, 40, 00, 89, 1D, EC, 81, 40, 00, 89, 35, E8, 81, 40, 00, 89, 3D, E4, 81, 40, 00, 66, 8C, 15, 10, 82, 40, 00, 66, 8C, 0D, 04, 82, 40, 00, 66, 8C, 1D, E0, 81, 40, 00, 66, 8C, 05, DC, 81, 40, 00, 66, 8C, 25, D8, 81, 40, 00, 66, 8C, 2D, D4, 81, 40, 00, 9C, 8F, 05, 08, 82, 40, 00, 8B, 45, 00, A3, FC, 81, 40, 00, 8B, 45, 04, A3, 00, 82, 40, 00, 8D, 45, 08, A3, 0C, 82, 40...
 
[+]

Entropy:
6.6669

Code size:
14.5 KB (14,848 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
WirelessConfig

Command:
C:\users\{user}\appdata\roaming\svchost10.exe


The file new folder has been seen being distributed by the following URL.

temp:new folder .exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to text-lb.esams.wikimedia.org  (91.198.174.192:443)

TCP (HTTP):
Connects to vip1.g5.cachefly.net  (66.225.197.197:80)

TCP (HTTP):
Connects to text-lb.eqiad.wikimedia.org  (208.80.154.224:80)

TCP (HTTP):
Connects to text-lb.codfw.wikimedia.org  (208.80.153.224:80)

TCP (HTTP):
Connects to a95-101-72-49.deploy.akamaitechnologies.com  (95.101.72.49:80)

Remove new folder - Powered by Reason Core Security