ruslobofludo.exe

ireeghjkrdy

loihytgvfd

The executable ruslobofludo.exe has been detected as malware by 24 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘ruslobofludo’. While running, it connects to the Internet address nakedcumshots.com on port 80 using the HTTP protocol.
Publisher:
loihytgvfd

Product:
ireeghjkrdy

Version:
4.01.0454

MD5:
21276590c307d5524a3e10a172de697f

SHA-1:
b6eb12bd086e28b38960707baa3785e6448f0bf1

SHA-256:
08e037a20ccf45bd428e787d40650a56916da25b5b8b5ad713899617f401379f

Scanner detections:
24 / 68

Status:
Malware

Analysis date:
12/26/2024 12:18:46 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Symmi.36586
1136

Agnitum Outpost
Trojan.PWS.Tepfer
7.1.1

AhnLab V3 Security
Trojan/Win32.Jorik
2013.12.21

Avira AntiVirus
TR/Dropper.VB.7979.17
7.11.120.248

avast!
Sf:Bancos-D [Trj]
2014.9-131225

AVG
Dropper.Generic9
2014.0.3614

Baidu Antivirus
Trojan.Win32.InfoStealer
4.0.3.131225

Bitdefender
Gen:Variant.Symmi.36586
1.0.20.1795

Dr.Web
Trojan.PWS.Stealer.3128
9.0.1.0359

Emsisoft Anti-Malware
Gen:Variant.Symmi.36586
8.13.12.25.08

ESET NOD32
Win32/Injector.ATRC (variant)
7.9190

F-Prot
W32/Trojan2.OAPU
v6.4.7.1.166

F-Secure
Gen:Variant.Symmi.36586
11.2013-25-12_4

G Data
Gen:Variant.Symmi.36586
13.12.22

IKARUS anti.virus
Trojan-PWS.Win32.Tepfer
t3scan.2.2.29

Kaspersky
Trojan-PSW.Win32.Tepfer
14.0.0.4566

Malwarebytes
Trojan.LVBP.ED
v2013.12.25.08

McAfee
PWS-Zbot.gen.oj
5600.7270

Microsoft Security Essentials
VirTool:Win32/VBInject.gen!LD
1.165.247.01

MicroWorld eScan
Gen:Variant.Symmi.36586
14.0.0.1077

Panda Antivirus
Trj/CI.A
13.12.25.08

Sophos
Troj/Agent-ADBJ
4.96

Trend Micro House Call
TROJ_GEN.R08NH08LI13
7.2.359

Vba32 AntiVirus
TScope.Trojan.VB
3.12.24.3

File size:
163.5 KB (167,473 bytes)

Product version:
4.01.0454

Original file name:
Dino1.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\compaq\ruslobofludo.exe

File PE Metadata
Compilation timestamp:
12/16/2013 2:54:48 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:hFLb5Tx+Pk3s8F8UUz2GWmbr7LbtNIOIneh/w+GMbki1gr0dE82uIe:bZsC+GMbDgIlb

Entry address:
0x111C

Entry point:
68, 5C, 13, 40, 00, E8, F0, FF, FF, FF, 00, 00, 40, 00, 00, 00, 30, 00, 00, 00, 38, 00, 00, 00, 00, 00, 00, 00, 07, F5, FB, 14, D9, AD, 48, 44, 85, 8B, B7, 5A, F5, BC, 32, CC, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 6B, 69, 6A, 6E, 62, 67, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 88, 00, 00, 00, 00, 00, 00, 00, 02, 00, 00, 00, 02, 00, 00, 00, D6, ED, 13, 0E, 82, 0C, 3B, 44, A1, 6F, 91, 06, DC, 21, 53, 78, 01, 00, 00, 00, 98, 00, 00, 00, A8, 00, 00, 00, 01, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual Basic v5.0/v6.0

Code size:
60 KB (61,440 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
ruslobofludo

Command:
C:\users\compaq\ruslobofludo.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to white.besthost.jp  (49.212.129.148:80)

TCP (HTTP):
Connects to vme49ee.bsws.de  (81.209.182.37:80)

TCP (HTTP):
Connects to vm16202.mailclub.pro  (195.64.165.29:80)

TCP (HTTP):
Connects to url.hover.com  (64.99.80.30:80)

TCP (HTTP):
Connects to structives.com  (70.32.113.95:80)

TCP (HTTP):
Connects to server88-208-216-219.live-servers.net  (88.208.216.219:80)

TCP (HTTP):
Connects to pro-managed.com  (186.2.166.49:80)

TCP (HTTP):
Connects to P3431629  (66.135.32.56:80)

TCP (HTTP):
Connects to o-ho.ru  (78.47.135.34:80)

TCP (HTTP):
Connects to nina.juizi.com  (5.9.122.172:80)

TCP (HTTP):
Connects to nakedcumshots.com  (64.59.81.104:80)

TCP (HTTP):
Connects to lb03.virt.lolipop.jp  (210.172.144.22:80)

TCP (HTTP):
Connects to ks4000591.ip-198-245-62.net  (198.245.62.145:80)

TCP (HTTP):
Connects to jaferparafusos.com.br  (108.175.148.57:80)

TCP (HTTP):
Connects to ip-50-63-84-77.ip.secureserver.net  (50.63.84.77:80)

TCP (HTTP):
Connects to ip-188-121-45-218.ip.secureserver.net  (188.121.45.218:80)

TCP (HTTP):
Connects to host253-200-110-95.serverdedicati.aruba.it  (95.110.200.253:80)

TCP (HTTP):
Connects to hm8021.publiccloud.com.br  (186.202.149.17:80)

TCP (HTTP):
Connects to ec2-54-229-116-65.eu-west-1.compute.amazonaws.com  (54.229.116.65:80)

TCP (HTTP):
Connects to cpanel01.hstbr.net  (216.245.218.146:80)

Remove ruslobofludo.exe - Powered by Reason Core Security