Service_KMS.exe

Service_KMS

The executable Service_KMS.exe has been detected as malware by 11 anti-virus scanners. It runs as a separate (within the context of its own process) windows Service named “Service KMSELDI”. While running, it connects to the Internet address 2a.6a.acb8.ip4.static.sl-reverse.com on port 13.
Product:
Service_KMS

Version:
10.2.0.0

MD5:
d62c62edff72bd506ae751bbd41ee358

SHA-1:
997cea9a7c0780a71fff6d5201fc9b69a3a6c328

SHA-256:
db4c4bfbde68fd9ea4e8ff776cafb629d2362f509d19d563dbff4713382230fa

Scanner detections:
11 / 68

Status:
Malware

Analysis date:
11/23/2024 4:29:19 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Dropper.Msil
2014.0.3619

Baidu Antivirus
Trojan.Win32.Generic
4.0.3.131221

ESET NOD32
MSIL/HackTool.IdleKMS (variant)
7.9151

IKARUS anti.virus
Win32.SuspectCrc
t3scan.2.2.29

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.4588

McAfee
RDN/Generic Dropper!sh
5600.7275

Norman
Agent.AOQWC
11.20131221

Sophos
Mal/Generic-S
4.95

Trend Micro House Call
TROJ_GEN.R0CBC0PL813
7.2.355

Trend Micro
TROJ_GEN.R0CBC0PL813
10.465.21

VIPRE Antivirus
Trojan.Win32.Generic
24190

File size:
670 KB (686,080 bytes)

Product version:
10.2.0.0

Original file name:
Service_KMS.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\kmspico\service_kms.exe

File PE Metadata
Compilation timestamp:
11/11/2013 8:52:50 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:fomT1omoVSlxJvANHXTrw90HSPxHPdC3igdX99nCdCYkpJ7:ZToYlrSjr28O2tX9X7

Entry address:
0xA533E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.6417

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
653 KB (668,672 bytes)

Service
Display name:
Service KMSELDI

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to time-c.nist.gov  (129.6.15.30:13)

TCP:
Connects to nist.netservicesgroup.com  (64.113.32.5:13)

TCP:
Connects to time-d.nist.gov  (129.6.15.27:13)

TCP:
Connects to nist1-lnk.binary.net  (216.229.0.179:13)

TCP:
Connects to 207_223_123_18.colo.teklinks.net  (207.223.123.18:13)

TCP:
Connects to india.colorado.edu  (128.138.140.44:13)

TCP:
Connects to nist-time-server.eoni.com  (216.228.192.69:13)

TCP:
Connects to time-b.timefreq.bldrdoc.gov  (132.163.4.102:13)

TCP:
Connects to 2a.6a.acb8.ip4.static.sl-reverse.com  (184.172.106.42:13)

TCP:
Connects to utcnist2.colorado.edu  (128.138.141.172:13)

TCP:
Connects to time-b.nist.gov  (129.6.15.29:13)

TCP:
Connects to nisttime.edzone.net  (198.111.152.100:13)

TCP:
Connects to host-24-56-178-140.beyondbb.com  (24.56.178.140:13)

TCP:
Connects to time-a.nist.gov  (129.6.15.28:13)

Remove Service_KMS.exe - Powered by Reason Core Security