serv.exe

ACM1PT

The executable serv.exe has been detected as malware by 15 anti-virus scanners. This is a setup program which is used to install the application. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘cc81d0f2278f255a7ae77f54899ebfd9’. According to AVG, this software downloads additional adware offers during setup.
Publisher:
ACM1PT

Product:
ACM1PT

Version:
34.4.5.4

MD5:
f897b493bf02fc1f139d9a3136c3a5fc

SHA-1:
8cf39292fe0cb009ed846309c62cee338c2c98fe

SHA-256:
cfaa734b29cdd3dab65e8cbfdfe1b2732e653d03cc2dc5a512c56559f6245720

Scanner detections:
15 / 68

Status:
Malware

Analysis date:
12/25/2024 3:46:28 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Barys.2319
393

AhnLab V3 Security
Malware/Gen.Generic
2016.01.03

Arcabit
Trojan.Barys.D90F
1.0.0.637

avast!
Win32:Malware-gen
2014.9-160107

AVG
Downloader.MSIL
2017.0.2871

Baidu Antivirus
Trojan.MSIL.Small
4.0.3.1617

Bitdefender
Gen:Variant.Barys.2319
1.0.20.35

Emsisoft Anti-Malware
Gen:Variant.Barys.2319
8.16.01.07.06

ESET NOD32
MSIL/TrojanDownloader.Small.ACU (variant)
10.12804

F-Secure
Gen:Variant.Barys.2319
11.2016-07-01_5

G Data
Gen:Variant.Barys.2319
16.1.25

IKARUS anti.virus
Trojan.VB.Crypt
t3scan.1.9.5.0

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.851

MicroWorld eScan
Gen:Variant.Barys.2319
17.0.0.21

NANO AntiVirus
Trojan.Win32.FrauDrop.dkkzcz
1.0.14.5380

File size:
45 MB (47,185,920 bytes)

Product version:
34.4.5.4

Copyright:
ACM1PT

Original file name:
xdxd.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\serv.exe

File PE Metadata
Compilation timestamp:
11/12/2015 5:22:04 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:q5uhRb6EGZZEi9JIAGM/UCqCDA8N5Xw8:q56mPE6L/nA8N5z

Entry address:
0xE7BE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, EC, F4, 44, 56, 00, 00, 00, 00, 02, 00, 00, 00, 1C, 01, 00, 00, 1C, 00, 01, 00, 1C, CC, 00, 00, 52, 53, 44, 53, 87, 1F, F9, 32, 34, 0F, D0, 4A, AE, 6E, 6E, 8F, 78, 20, 1A, 47, 01, 00, 00, 00, 43, 3A, 5C, 55, 73, 65, 72, 73, 5C, 69...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
50 KB (51,200 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
cc81d0f2278f255a7ae77f54899ebfd9

Command:
"C:\users\{user}\appdata\local\temp\serv.exe"..


The file serv.exe has been seen being distributed by the following URL.

Remove serv.exe - Powered by Reason Core Security