pando_karosroshla.exe

The executable pando_karosroshla.exe has been detected as malware by 23 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from dwcdn2.axeso5.com.
MD5:
874fcc15071581b1f663054726842761

SHA-1:
d315b9bc0222b0f8bb99b2fbcb76f1b560fe3e03

SHA-256:
c7ef4e8b42cefdbe285522179849be3076a92e1b945d26d4c223c01d4690dce4

Scanner detections:
23 / 68

Status:
Malware

Analysis date:
12/24/2024 12:40:22 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKDV.1005677
238

Agnitum Outpost
Trojan.DR.Injector
7.1.1

Avira AntiVirus
TR/Rogue.1005677
7.11.151.112

AVG
Dropper.Generic8
2017.0.2716

Bitdefender
Trojan.GenericKDV.1005677
1.0.20.815

Comodo Security
UnclassifiedMalware
18326

Emsisoft Anti-Malware
Trojan.GenericKDV.1005677
8.16.06.11.08

Fortinet FortiGate
W32/Injector.IJXQ!tr
6/11/2016

F-Secure
Trojan.GenericKDV.1005677
11.2016-11-06_7

G Data
Trojan.GenericKDV.1005677
16.6.24

IKARUS anti.virus
Trojan-Dropper.Win32.Injector
t3scan.1.6.1.0

K7 AntiVirus
Riskware
13.178.12184

Kaspersky
Trojan-Dropper.Win32.Injector
14.0.0.73

McAfee
Artemis!874FCC150715
5600.6372

MicroWorld eScan
Trojan.GenericKDV.1005677
17.0.0.489

Norman
Obfuscated_M.JCM
11.20160611

nProtect
Trojan.GenericKDV.1005677
14.05.25.01

Panda Antivirus
Trj/CI.A
16.06.11.08

Trend Micro House Call
TROJ_GEN.R0CBC0UD214
7.2.163

Trend Micro
TROJ_GEN.R0CBC0UD214
10.465.11

Vba32 AntiVirus
TrojanDropper.Injector
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
29618

ViRobot
Dropper.A.Injector.2002432
2011.4.7.4223

File size:
1.9 MB (2,002,432 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\pando_karosroshla.exe

File PE Metadata
Compilation timestamp:
2/18/2013 3:24:58 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
49152:QnDk2Oii5SxihNMB6MZLZbahOkV4jOaHeO1X+JqYIY:oDMYoMtchtWjOa+O1X+JqYIY

Entry address:
0x698010

Entry point:
60, BE, 15, 10, 8B, 00, 8D, BE, EB, FF, B4, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
1.9 MB (1,998,848 bytes)

The file pando_karosroshla.exe has been seen being distributed by the following URL.

Remove pando_karosroshla.exe - Powered by Reason Core Security