sem-11_servicio_dhcp_-_2016-05-26__3311__.exe

ScrSelfPlayer Application

The executable sem-11_servicio_dhcp_-_2016-05-26__3311__.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from idatvirtual.edu.pe.
Product:
ScrSelfPlayer Application

Description:
ScrSelfPlayer

Version:
1, 2, 0, 1

MD5:
0014b1a0c512b24d4bbcbdb694c16b2a

SHA-1:
54c8f0fd64cf6d84d194e8e8ec158d8042871de9

SHA-256:
0f0fbb961a6c4a2f011b77f0dda2ad3dd8cf67a6a9f991911b4cc42f0dce7269

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/6/2024 3:46:28 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.7.9.20

File size:
4.1 MB (4,333,388 bytes)

Product version:
1, 2, 0, 1

Copyright:
Copyright (C) 2007 Stepok Image Lab.

Original file name:
ScrSelfPlayer.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\sem-11_servicio_dhcp_-_2016-05-26__3311__.exe

File PE Metadata
Compilation timestamp:
11/22/2007 7:40:36 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:NIuSuQ45/gYgUPRPxIdYm8mO2shF8jNDcrVrxr/r3reC0j+u8Ak:NIE5/pgUPRP4u2S8jNDshFD7ej+u8Ak

Entry address:
0x2B5E0

Entry point:
60, BE, 00, 60, 41, 00, 8D, BE, 00, B0, FE, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.9461

Packer / compiler:
UPX 2.90LZMA

Code size:
88 KB (90,112 bytes)

The file sem-11_servicio_dhcp_-_2016-05-26__3311__.exe has been seen being distributed by the following URL.