services.exe

The executable services.exe has been detected as malware by 41 anti-virus scanners. While running, it connects to the Internet address www.ovip.icq.com on port 80 using the HTTP protocol.
MD5:
b52bcc330c7d0576e4fbc3e90418da90

SHA-1:
1033737fefd4f0a3a1a2b0352427220a26c4bd6a

SHA-256:
abfae5d32e490d777ab3ca053847c29e73c4164eb46df3ce5aa81ea95d380588

Scanner detections:
41 / 68

Status:
Malware

Analysis date:
11/5/2024 11:18:02 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Backdoor.Generic.711974
367

Agnitum Outpost
Backdoor.Prorat.AR1
7.1.1

AhnLab V3 Security
Trojan/Win32.Prorat
2015.09.08

Avira AntiVirus
BDS/Prorat.19.i.A
8.3.2.2

Arcabit
Backdoor.Generic.DADD26
1.0.0.425

avast!
Win32:Prorat-IR [Trj]
2014.9-160202

AVG
BackDoor.Generic14
2017.0.2845

Baidu Antivirus
Backdoor.Win32.Prorat
4.0.3.1622

Bitdefender
Backdoor.Generic.711974
1.0.20.165

Bkav FE
W32.OnlineGameXVMA.Trojan
1.3.0.7133

Clam AntiVirus
Trojan.Prorat.19-55
0.98/21511

Comodo Security
Backdoor.Win32.Agent.AVW85
23194

Dr.Web
Trojan.DownLoad1.39115
9.0.1.033

Emsisoft Anti-Malware
Backdoor.Generic.711974
8.16.02.02.06

ESET NOD32
Win32/Prorat.19
10.12214

Fortinet FortiGate
W32/Prorat.I!tr.bdr
2/2/2016

F-Prot
W32/ProratP.A
v6.4.7.1.166

F-Secure
Backdoor.Generic.711974
11.2016-02-02_3

G Data
Backdoor.Generic.711974
16.2.25

IKARUS anti.virus
Backdoor.Win32.Prorat
t3scan.1.9.5.0

K7 AntiVirus
Trojan
13.2017132

Kaspersky
Backdoor.Win32.Prorat
14.0.0.721

Malwarebytes
Backdoor.ProRat
v2016.02.02.06

McAfee
BackDoor-AVW
5600.6501

Microsoft Security Essentials
Backdoor:Win32/Prorat.L
1.1.12002.0

MicroWorld eScan
Backdoor.Generic.711974
17.0.0.99

NANO AntiVirus
Trojan.Win32.Prorat-19.hhti
0.30.24.3283

nProtect
Backdoor/W32.Prorat.350764.E
15.09.07.01

Panda Antivirus
Trj/Genetic.gen
16.02.02.06

Qihoo 360 Security
HEUR/Malware.QVM11.Gen
1.0.0.1015

Quick Heal
Backdoor.Prorat.19.i.n3
2.16.14.00

Rising Antivirus
NORMAL:Backdoor.ProRat.19.iv!419407[F1]
23.00.65.16131

Sophos
Troj/Prorat-19
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Proorat
9347

Total Defense
Win32/ProRat.L
37.1.62.1

Trend Micro House Call
BKDR_PRORAT.SMM
7.2.33

Trend Micro
BKDR_PRORAT.SMM
10.465.02

Vba32 AntiVirus
MalwareScope.Trojan-PSW.Pinch.1
3.12.26.4

VIPRE Antivirus
Backdoor.Win32.Agent.aaz
43520

ViRobot
Backdoor.Win32.Prorat.350764.M[h]
2014.3.20.0

Zillya! Antivirus
Backdoor.Prorat.Win32.694
2.0.0.2388

File size:
342.5 KB (350,764 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\services.exe

File PE Metadata
Compilation timestamp:
11/19/2004 5:49:18 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

CTPH (ssdeep):
6144:DRqmpp+amNOGokzLyM9tsLAitQo6tzOKkzIt8gKyfjxfR9D2j4y4QM5ui:VqmpplpGoGL3etQoMiXM8gxf/Sj4yYAi

Entry address:
0x1FA4B0

Entry point:
60, BE, 00, 60, 5A, 00, 8D, BE, 00, B0, E5, FF, C7, 87, 1C, 70, 1D, 00, 07, 5A, 58, 8B, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 19, 8B, 1E, 83, EE, FC, 11, DB, 72, 10, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 78, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07...
 
[+]

Entropy:
7.8946

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
340 KB (348,160 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.ovip.icq.com  (178.237.20.20:80)

TCP (HTTP):
Connects to lb-182-209.above.com  (103.224.182.209:80)

Remove services.exe - Powered by Reason Core Security