services.exe

The executable services.exe has been detected as malware by 4 anti-virus scanners. While running, it connects to the Internet address lb-182-209.above.com on port 80 using the HTTP protocol.
MD5:
48226a00b8a81c57ccbdac9602f5d047

SHA-1:
aface598cfdfd8c55175aa5c01a6a7631d35ab58

Scanner detections:
4 / 68

Status:
Malware

Analysis date:
12/25/2024 1:43:58 PM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Trojan.Prorat-37
0.98/23140

Dr.Web
BackDoor.ProRat.19
9.0.1.05190

ESET NOD32
Win32/Prorat.19 trojan
6.3.12010.0

F-Prot
W32/ProratP.A
4.6.5.141

File size:
342.5 KB (350,764 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\services.exe

File PE Metadata
Compilation timestamp:
11/19/2004 1:19:18 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

Entry address:
0x1FA4C0

Entry point:
60, BE, 00, 60, 5A, 00, 8D, BE, 00, B0, E5, FF, C7, 87, 1C, 70, 1D, 00, 07, 5A, 58, 8B, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 19, 8B, 1E, 83, EE, FC, 11, DB, 72, 10, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 78, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
340 KB (348,160 bytes)

InstalledComponents
Name:
{5Y99AE78-58TT-11dW-BE53-Y67078979Y}


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.ovip.icq.com  (178.237.20.20:80)

TCP (HTTP):
Connects to lb-182-209.above.com  (103.224.182.209:80)

Remove services.exe - Powered by Reason Core Security