setup0023.exe

日历表

SHANGHAI FENGHAN NETWORK INFORMATION TECHNOLOGY STUDIO

The application setup0023.exe by SHANGHAI FENGHAN NETWORK INFORMATION TECHNOLOGY STUDIO has been detected as a potentially unwanted program by 6 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from down.nonglirili.net.
Product:
日历表

Description:
日历表安装程序

Version:
1.0.1.0

MD5:
265c2adab71707ebc335e14861a1074c

SHA-1:
62b8097b16ae359aa68f46abd8fe6bd7dee0d17f

SHA-256:
338e823f74e11c74a09840710b0b9fa7a84b22f331648a6082b309991439ec2a

Scanner detections:
6 / 68

Status:
Potentially unwanted

Analysis date:
11/24/2024 5:02:37 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Malware-gen
2014.9-140813

Dr.Web
BackDoor.Infector.50
9.0.1.0225

IKARUS anti.virus
AdWare.Downloader
t3scan.1.6.1.0

McAfee
Artemis!265C2ADAB717
5600.7040

Trend Micro House Call
Suspicious_GEN.F47V0810
7.2.225

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.3

File size:
4.3 MB (4,515,720 bytes)

Copyright:
(C) http://www.rilibiao.com.cn/

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Chinese (Simplified, China)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/7/2014 1:00:00 AM

Valid to:
4/7/2017 12:59:59 AM

Subject:
CN=SHANGHAI FENGHAN NETWORK INFORMATION TECHNOLOGY STUDIO, OU=IT, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SHANGHAI FENGHAN NETWORK INFORMATION TECHNOLOGY STUDIO, L=Shanghai, S=Shanghai, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
694E2E0ECECA0C1410EC755324F4D446

File PE Metadata
Compilation timestamp:
7/24/2014 4:27:35 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:kdapS2zoRDJOW0Igw/OxAMLvQUg7ONJCXyz4f8NBdCeQexwq:zp7C0Ig8gL4UWSJCX+4f8hCeQ1q

Entry address:
0x337A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, A8, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, B8, 7C, 43, 00, E8, 04, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 7B, 43, 00, 8D, 44, 24, 38, 50, 53, 68, 3B, 74, 40, 00, FF, 15, 58, 71, 40, 00, 68, 30, 74, 40, 00, 68, C0, 53, 43, 00, E8, F6, 23, 00, 00, FF, 15, B0, 70, 40, 00, 50, BF, 00, 10, 45, 00, 57, E8, E4, 23, 00, 00...
 
[+]

Entropy:
7.9974

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file setup0023.exe has been seen being distributed by the following URL.

Remove setup0023.exe - Powered by Reason Core Security