saber.exe

Dening Hu

The application saber.exe by Dening Hu has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “winsaber”. While running, it connects to the Internet address server-52-84-246-247.sfo20.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Dening Hu  (signed and verified)

MD5:
d1f62099fd31aaf2e04e8aa58b3693ba

SHA-1:
d1b582d8ca375d3524f52f60afdf10192106f755

SHA-256:
261e93f204150b654dbe27a32c3aa9c86ae2000bdc227110ead06545bf24242a

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/23/2024 7:15:50 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Elex (M)
16.9.21.7

File size:
509.2 KB (521,464 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\msuser.default\help_5\{61ed7ad9-e23c-4814-8ab1-347a787d4c06}\0wr\saber.exe

Digital Signature
Signed by:

Subject:
CN=Dening Hu, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Serial number:
28815147F65303725E3AE5B01964312F

File PE Metadata
Compilation timestamp:
9/21/2016 7:46:46 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

CTPH (ssdeep):
12288:A9Kdzob5baq/attGgjflJrGoKy7C3Il8vUBEH4JEEuw3B5F:A9KaptQzGoJ7CSEHaEq3B5F

Entry address:
0x361DB

Entry point:
E8, 8B, 04, 00, 00, E9, 80, FE, FF, FF, 55, 8B, EC, 56, FF, 75, 08, 8B, F1, E8, 5D, D6, FD, FF, C7, 06, C8, 4E, 46, 00, 8B, C6, 5E, 5D, C2, 04, 00, 83, 61, 04, 00, 8B, C1, 83, 61, 08, 00, C7, 41, 04, D0, 4E, 46, 00, C7, 01, C8, 4E, 46, 00, C3, 55, 8B, EC, 56, FF, 75, 08, 8B, F1, E8, 2A, D6, FD, FF, C7, 06, E4, 4E, 46, 00, 8B, C6, 5E, 5D, C2, 04, 00, 83, 61, 04, 00, 8B, C1, 83, 61, 08, 00, C7, 41, 04, EC, 4E, 46, 00, C7, 01, E4, 4E, 46, 00, C3, 55, 8B, EC, 83, EC, 0C, 8D, 4D, F4, E8, DA, FF, FF, FF, 68, 5C...
 
[+]

Entropy:
6.4586

Code size:
373.5 KB (382,464 bytes)

Service
Display name:
winsaber

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-84-246-247.sfo20.r.cloudfront.net  (52.84.246.247:80)

TCP (HTTP):
Connects to server-54-239-132-176.sfo9.r.cloudfront.net  (54.239.132.176:80)

TCP (HTTP):
Connects to server-54-239-132-14.sfo9.r.cloudfront.net  (54.239.132.14:80)

TCP (HTTP):
Connects to server-54-192-37-68.jfk1.r.cloudfront.net  (54.192.37.68:80)

TCP (HTTP):
Connects to server-54-192-37-117.jfk1.r.cloudfront.net  (54.192.37.117:80)

TCP (HTTP):
Connects to server-54-192-37-100.jfk1.r.cloudfront.net  (54.192.37.100:80)

TCP (HTTP):
Connects to server-52-85-77-74.lax3.r.cloudfront.net  (52.85.77.74:80)

TCP (HTTP):
Connects to server-52-84-246-192.sfo20.r.cloudfront.net  (52.84.246.192:80)

Remove saber.exe - Powered by Reason Core Security