papas-burgeria.exe

Papa's Burgeria

Siteken Network Co., Ltd.

The application papas-burgeria.exe, “Papa's Burgeria Setup” has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from edown.feeplay.com. While running, it connects to the Internet address apache2-dap.jonathan-dayton.dreamhost.com on port 80 using the HTTP protocol.
Publisher:
Siteken Network Co., Ltd.

Product:
Papa's Burgeria

Description:
Papa's Burgeria Setup

Version:
1.0.0.1

MD5:
05cba6e98dd387de75600a830519364d

SHA-1:
5350657f81bf3ddeaff73b9582327dc1425cbb3b

SHA-256:
e4db79da50d1f7252869ffcc45275a3d24d956ec2de07ad6ad60a10a5fd66557

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
12/28/2024 11:36:39 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

ESET NOD32
Win32/RiskWare.PrefChanger
10.12186

IKARUS anti.virus
PUA.RiskWare.Prefchanger
t3scan.1.9.5.0

McAfee
Artemis!05CBA6E98DD3
5600.6501

Rising Antivirus
PE:Malware.Generic/QRS!1.9E2D[F1]
23.00.65.16131

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

File size:
3.4 MB (3,534,294 bytes)

Product version:
1.0.0.1

Copyright:
Copyright (C) 2014 Siteken.com. All Rights Reserved.

Trademarks:
Papa's Burgeria

Original file name:
Papa's Burgeria.exe

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Chinese (Simplified, PRC)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\papas-burgeria.exe

File PE Metadata
Compilation timestamp:
6/18/2009 10:33:23 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:gFm53HaYQp8p9Z6XScpAQ1b52fKUv61sEynXRj12z9iYzJ:om536YQp8p9emKtQKUvHn32RiYzJ

Entry address:
0x3121

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 5C, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 3F, 42, 00, E8, A2, 2C, 00, 00, A3, 64, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 24, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 50, 91, 40, 00, 68, 60, 36, 42, 00, E8, 2B, 29, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 19, 29, 00, 00...
 
[+]

Entropy:
7.9936

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file papas-burgeria.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to apache2-dap.jonathan-dayton.dreamhost.com  (173.236.225.31:80)

Remove papas-burgeria.exe - Powered by Reason Core Security