rafo_yound.exe

Yu Bao

The executable rafo_yound.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from jogotempo.com. While running, it connects to the Internet address server-54-230-5-236.dfw3.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yu Bao  (signed and verified)

MD5:
96864624bacbaa731abd4beb47673df2

SHA-1:
08778bc43a337970fc78176f1e36c8fc721b5701

SHA-256:
80699a3bfecfa0c923767667164b30545d45071fa6d7f310025f2639ca66296e

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/27/2024 2:39:00 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.1.21.9

File size:
418.5 KB (428,592 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\rafo_yound.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/11/2017 5:30:00 AM

Valid to:
11/22/2017 5:29:59 AM

Subject:
CN=Yu Bao, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
3CE0BE60AB8302A19B71948EEBC13037

File PE Metadata
Compilation timestamp:
12/28/2016 5:22:13 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x305F

Entry point:
E8, A7, 46, 00, 00, E9, 51, 99, 00, 00, 55, 8B, EC, 8B, 45, 08, 8B, 00, 81, 38, 52, 43, 43, E0, 74, 21, 81, 38, 4D, 4F, 43, E0, 74, 19, 81, 38, 63, 73, 6D, E0, 75, 2A, E8, 00, 10, 00, 00, 83, A0, 90, 00, 00, 00, 00, E9, 6D, 0F, 00, 00, E8, EF, 0F, 00, 00, 83, B8, 90, 00, 00, 00, 00, 7E, 0B, E8, E1, 0F, 00, 00, FF, 88, 90, 00, 00, 00, 33, C0, 5D, C3, 6A, 02, E8, 1D, 48, 00, 00, 59, C3, 55, 8B, EC, 56, 8B, F1, E8, B8, 0F, 00, 00, F6, 45, 08, 01, 74, 07, 56, E8, DB, 46, 00, 00, 59, 8B, C6, 5E, 5D, C2, 04, 00...
 
[+]

Entropy:
7.7934  (probably packed)

Code size:
371.5 KB (380,416 bytes)

The file rafo_yound.exe has been seen being distributed by the following URL.

http://jogotempo.com/res/get.php?filepath=/res/.../rafo_yound.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-187-209.cdg51.r.cloudfront.net  (54.230.187.209:80)

TCP (HTTP):
Connects to server-54-230-187-16.cdg51.r.cloudfront.net  (54.230.187.16:80)

TCP (HTTP):
Connects to server-54-230-163-238.jax1.r.cloudfront.net  (54.230.163.238:80)

TCP (HTTP):
Connects to server-52-85-63-171.lhr50.r.cloudfront.net  (52.85.63.171:80)

TCP (HTTP):
Connects to server-52-84-230-157.sfo9.r.cloudfront.net  (52.84.230.157:80)

TCP (HTTP):
Connects to server-54-230-216-192.mrs50.r.cloudfront.net  (54.230.216.192:80)

TCP (HTTP):
Connects to server-54-230-5-236.dfw3.r.cloudfront.net  (54.230.5.236:80)

TCP (HTTP):
Connects to server-54-230-216-104.mrs50.r.cloudfront.net  (54.230.216.104:80)

TCP (HTTP):
Connects to server-54-230-206-75.atl50.r.cloudfront.net  (54.230.206.75:80)

TCP (HTTP):
Connects to server-54-230-187-122.cdg51.r.cloudfront.net  (54.230.187.122:80)

TCP (HTTP):
Connects to server-54-192-3-169.lhr5.r.cloudfront.net  (54.192.3.169:80)

TCP (HTTP):
Connects to server-52-85-63-70.lhr50.r.cloudfront.net  (52.85.63.70:80)

TCP (HTTP):
Connects to server-52-85-63-151.lhr50.r.cloudfront.net  (52.85.63.151:80)

TCP (HTTP):
Connects to server-52-84-246-150.sfo20.r.cloudfront.net  (52.84.246.150:80)

TCP (HTTP):
Connects to server-54-230-163-54.jax1.r.cloudfront.net  (54.230.163.54:80)

TCP (HTTP):
Connects to server-52-85-83-110.lax1.r.cloudfront.net  (52.85.83.110:80)

TCP (HTTP):
Connects to server-52-84-230-46.sfo9.r.cloudfront.net  (52.84.230.46:80)

TCP (HTTP):
Connects to server-54-230-216-99.mrs50.r.cloudfront.net  (54.230.216.99:80)

TCP (HTTP):
Connects to server-54-230-216-183.mrs50.r.cloudfront.net  (54.230.216.183:80)

TCP (HTTP):
Connects to server-54-230-216-162.mrs50.r.cloudfront.net  (54.230.216.162:80)

Remove rafo_yound.exe - Powered by Reason Core Security