services.exe

The executable services.exe has been detected as malware by 5 anti-virus scanners. While running, it connects to the Internet address www.ovip.icq.com on port 80 using the HTTP protocol.
MD5:
e6025e1a4296ed14f1b38a343943e4c6

SHA-1:
beb066eca53150ba4547701fd4fbd404e45fafff

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
11/5/2024 10:54:39 PM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Trojan.Prorat-37
0.98/23123

ESET NOD32
Win32/Prorat.19 trojan
6.3.12010.0

F-Prot
W32/ProratP.A
4.6.5.141

Kaspersky
Backdoor.Win32.Prorat
15.0.2.529

Microsoft Security Essentials
Backdoor:Win32/Prorat.L
1.237.127.0

File size:
342.5 KB (350,764 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
11/19/2004 7:19:18 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

Entry address:
0x1FA4A0

Entry point:
60, BE, 00, 60, 5A, 00, 8D, BE, 00, B0, E5, FF, C7, 87, 1C, 70, 1D, 00, 07, 5A, 58, 8B, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 19, 8B, 1E, 83, EE, FC, 11, DB, 72, 10, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 78, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07...
 
[+]

Entropy:
7.8947

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
340 KB (348,160 bytes)

InstalledComponents
Name:
{5Y99AE78-58TT-11dW-BE53-Y67078979Y}


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.ovip.icq.com  (178.237.20.20:80)

TCP (HTTP):
Connects to lb-182-209.above.com  (103.224.182.209:80)

Remove services.exe - Powered by Reason Core Security