office_password_recovery_toolbox_3.5.0.4_downloader.exe.downloading

Cheng Du VTools Information Technology

The file office_password_recovery_toolbox_3.5.0.4_downloader.exe.downloading by Cheng Du VTools Information Technology has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address www.rixler.com on port 80 using the HTTP protocol.
Publisher:

MD5:
ea2b18f087eeee20b04a673bf3ab310d

SHA-1:
5cd0364a85998669abb5f06ce15ed384965f073b

SHA-256:
b3f3c32d32a55661b361d1d5fd2644bbefe9e820facc32b7f65b8172ca410bdc

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/28/2024 3:34:10 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.9.30.23

File size:
781.8 KB (800,592 bytes)

Common path:
C:\users\{user}\downloads\office_password_recovery_toolbox_3.5.0.4_downloader.exe.downloading

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/10/2011 4:00:00 PM

Valid to:
1/25/2014 3:59:59 PM

Subject:
CN=Cheng Du VTools Information Technology, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Cheng Du VTools Information Technology, L=ChengDu, S=SiChuan, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1B5D68E0AFA12E8F1159C668DD228431

File PE Metadata
Compilation timestamp:
8/1/2013 10:58:58 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:m5UnZzPkMXdh4JIc+GIQDDIDtEtVJF1ohHuT5ZJLSM0O:lzP34OcDcZEXJFepuJSMN

Entry address:
0x1CE6C0

Entry point:
60, BE, 00, 90, 53, 00, 8D, BE, 00, 80, EC, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.7146

Packer / compiler:
UPX 2.90LZMA

Code size:
600 KB (614,400 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.rixler.com  (198.63.210.48:80)

TCP (HTTP):
Connects to 14.d7.24ae.ip4.static.sl-reverse.com  (174.36.215.20:80)