OperationCrackedServer.exe

Product

Company

The executable OperationCrackedServer.exe, “OperationCrackedServer” has been detected as malware by 26 anti-virus scanners. The file has been seen being downloaded from download2015.mediafire.com.
Publisher:
Company

Product:
Product

Description:
OperationCrackedServer

Version:
1.0.0.0

MD5:
1e1c0aca790e19107947ab3836ecb5d4

SHA-1:
081cf7579856dedf6f32a4902e4e69106ba34559

SHA-256:
3972f1f043d214a1a60135fe8457dd35227bf5e652bb481c42b7c34d615349c9

Scanner detections:
26 / 68

Status:
Malware

Analysis date:
11/23/2024 1:59:59 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.44111
751

Agnitum Outpost
Trojan.DR.Agent
7.1.1

Avira AntiVirus
TR/Dropper.Gen
7.11.137.112

avast!
Win32:Malware-gen
2014.9-150114

AVG
Generic34
2016.0.3229

Baidu Antivirus
Trojan.MSIL.Dropper
4.0.3.15114

Bitdefender
Gen:Variant.Kazy.44111
1.0.20.70

Comodo Security
UnclassifiedMalware
17939

Emsisoft Anti-Malware
Gen:Variant.Kazy.44111
8.15.01.14.09

ESET NOD32
Java/Jacksbot (variant)
9.9548

Fortinet FortiGate
MSIL/Dropper.JVA!tr
1/14/2015

F-Secure
Gen:Variant.Kazy.44111
11.2015-14-01_4

G Data
Gen:Variant.Kazy.44111
15.1.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.2.2.29

K7 AntiVirus
Riskware
13.176.11451

Kaspersky
Trojan-Dropper.MSIL.Agent
14.0.0.2641

McAfee
RDN/Generic Dropper!rn
5600.6885

MicroWorld eScan
Gen:Variant.Kazy.44111
16.0.0.42

NANO AntiVirus
Trojan.Win32.Agent.cftujs
0.28.0.58394

Norman
Troj_Generic.PPLKK
11.20150114

Panda Antivirus
Generic Malware
15.01.14.09

Quick Heal
TrojanDropper.MSIL.Agent.akqg
1.15.12.00

Sophos
Mal/DotNet-C
4.98

Trend Micro House Call
TROJ_GEN.R021C0RI813
7.2.14

Trend Micro
TROJ_GEN.R021C0RI813
10.465.14

VIPRE Antivirus
Trojan.Win32.Generic
27438

File size:
428 KB (438,272 bytes)

Product version:
1.0.0.0

Copyright:
Copyright

Trademarks:
Trademark

Original file name:
OperationCrackedServer.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\operationcrackedserver.exe

File PE Metadata
Compilation timestamp:
8/17/2013 10:22:49 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:yRxN880FxBBtH24Z82kF8IHku/GeJ3JweoTkmr8OhjX2qBK:yRw80N24Z82+8KkCJ3JwhTTRjX

Entry address:
0x44AAE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.2733

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
268 KB (274,432 bytes)

The file OperationCrackedServer.exe has been seen being distributed by the following URL.

Remove OperationCrackedServer.exe - Powered by Reason Core Security