sbornuk 2014.exe

The executable sbornuk 2014.exe has been detected as malware by 5 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from downloader-default5h.disk.yandex.net. While running, it connects to the Internet address stde85-1.fornex.org on port 80 using the HTTP protocol.
MD5:
01ab065f3af83bc06baa52fedab80fa7

SHA-1:
2dcb89db9feb80685743fdad3ed7903b2d37171b

SHA-256:
61742bc3a12b6e07c7450518c69675f0579cf2e13b51010a50dda6af8f432506

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
11/27/2024 10:58:24 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Skodna.GameHack
2016.0.2957

Baidu Antivirus
Hacktool.Win32.GameHack
4.0.3.151013

ESET NOD32
Win32/GameHack.SC potentially unsafe application
6.3.12010.0

Reason Heuristics
Threat.Win.Reputation.IMP
15.10.13.20

Trend Micro House Call
Suspicious_GEN.F47V0217
7.2.286

File size:
6.8 MB (7,170,048 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\jgd0\extract\sbornuk 2014.exe

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
196608:GDXqPDrRPaoXQ9IpinjPXY1nPNqorXcshI5z7AnW3R:GDXqPDFPaoXQK0XY1nPNrgshscnW3R

Entry address:
0xB9F001

Entry point:
60, E8, 03, 00, 00, 00, E9, EB, 04, 5D, 45, 55, C3, E8, 01, 00, 00, 00, EB, 5D, BB, ED, FF, FF, FF, 03, DD, 81, EB, 00, F0, B9, 00, 83, BD, 88, 04, 00, 00, 00, 89, 9D, 88, 04, 00, 00, 0F, 85, CB, 03, 00, 00, 8D, 85, 94, 04, 00, 00, 50, FF, 95, A9, 0F, 00, 00, 89, 85, 8C, 04, 00, 00, 8B, F0, 8D, 7D, 51, 57, 56, FF, 95, A5, 0F, 00, 00, AB, B0, 00, AE, 75, FD, 38, 07, 75, EE, 8D, 45, 7A, FF, E0, 56, 69, 72, 74, 75, 61, 6C, 41, 6C, 6C, 6F, 63, 00, 56, 69, 72, 74, 75, 61, 6C, 46, 72, 65, 65, 00, 56, 69, 72, 74...
 
[+]

Packer / compiler:
ASPack v2.12

Code size:
1.4 MB (1,419,776 bytes)

The file sbornuk 2014.exe has been seen being distributed by the following URL.

https://downloader-default5h.disk.yandex.net/rdisk/b7f285745a774d400b550ab12c7f2fe08e4a66470e235ff78b332430231c2afd/57c03d22/.../x-msdownload&fsize=7170048&hid=40fa1a01cdb504afbdf9ea3460c941b0&media_type=executable&tknv=v2&rtoken=jhKRt8scrHnj&force_default=no&ycrid=na-ce77d350d567e5932aca025dbd3a47c0-downloader9g

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to dev.ucoz.net  (193.109.247.6:80)

TCP (HTTP):
Connects to stde85-1.fornex.org  (185.26.97.189:80)

TCP (HTTP):
Connects to stde84-1.fornex.org  (185.26.97.188:80)

TCP (HTTP):
Connects to s23.ucoz.net  (195.216.243.23:80)

TCP (HTTP SSL):
Connects to sync.1dmp.io  (136.243.44.222:443)

TCP (HTTP SSL):
Connects to mc.yandex.ru  (87.250.251.119:443)

TCP (HTTP):
Connects to host05.rax.ru  (88.212.196.105:80)

TCP (HTTP):
Connects to dev44.ucoz.net  (217.199.217.44:80)

TCP (HTTP SSL):
Connects to cache.google.com  (109.194.25.106:443)

TCP (HTTP SSL):
Connects to 38.244.40.164-rev.hti.pl  (164.40.244.38:443)

TCP (HTTP SSL):
Connects to 20.13.119.185-rev.hti.pl  (185.119.13.20:443)

Remove sbornuk 2014.exe - Powered by Reason Core Security