services.exe

The executable services.exe has been detected as malware by 5 anti-virus scanners. While running, it connects to the Internet address lb-182-209.above.com on port 80 using the HTTP protocol.
MD5:
e79bd294b961e2a0ddc130fbb1b5c8c5

SHA-1:
a22af9573ada12436cb2671ba140815981891c79

SHA-256:
4c9542a72bc6b3af6f284efba7f8d7911ac5214cbbd6caf4fc5827a8b28567c3

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
12/25/2024 1:45:37 PM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Trojan.Prorat-37
0.98/23033

Dr.Web
Trojan.DownLoad1.39115
9.0.1.05190

ESET NOD32
Win32/Prorat.19 trojan
6.3.12010.0

F-Prot
W32/ProratP.A
4.6.5.141

Microsoft Security Essentials
Backdoor:Win32/Prorat.L
1.235.2398.0

File size:
342.5 KB (350,764 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\services.exe

File PE Metadata
Compilation timestamp:
11/19/2004 1:19:18 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

Entry address:
0x1FA4B0

Entry point:
60, BE, 00, 60, 5A, 00, 8D, BE, 00, B0, E5, FF, C7, 87, 1C, 70, 1D, 00, 07, 5A, 58, 8B, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 19, 8B, 1E, 83, EE, FC, 11, DB, 72, 10, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 78, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
340 KB (348,160 bytes)

Windows Firewall Allowed Program
Name:
services


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.ovip.icq.com  (178.237.20.20:80)

TCP (HTTP):
Connects to lb-182-209.above.com  (103.224.182.209:80)

Remove services.exe - Powered by Reason Core Security