setup377.exe

音速启动

Shanghai Tuizhong Network Technology Studio

The executable setup377.exe has been detected as malware by 9 anti-virus scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from ivy.pconline.com.cn.
Publisher:

Product:
音速启动

Description:
音速启动安装程序

Version:
5.6.0.140422

MD5:
60acf198c3f0a5949db8dce92f456056

SHA-1:
3c0b7b39b5f04594f114b16827e66c4badfdbde9

SHA-256:
7c50ddb7e3ba08336eff822760bc0253dd23fe49447215864f69ae2b33bf8995

Scanner detections:
9 / 68

Status:
Malware

Analysis date:
11/27/2024 3:57:36 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.Rogue
7.1.1

avast!
Win32:Malware-gen
2014.9-160131

Clam AntiVirus
Win.Trojan.11306639
0.98/21511

IKARUS anti.virus
Trojan.ATRAPS5
t3scan.1.9.5.0

K7 AntiVirus
Riskware
13.212.17655

McAfee
Artemis!60ACF198C3F0
5600.6503

Sophos
Mal/Emogen-F
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Rootkit
9351

VIPRE Antivirus
Trojan.Win32.Generic
44830

File size:
2.3 MB (2,422,648 bytes)

Copyright:
(C) http://www.3lsoft.com/

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Chinese (Simplified, PRC)

Common path:
C:\users\{user}\downloads\setup377.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/12/2013 8:00:00 AM

Valid to:
6/11/2016 7:59:59 AM

Subject:
CN=Shanghai Tuizhong Network Technology Studio, OU=IT, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Shanghai Tuizhong Network Technology Studio, L=ShangHai, S=ShangHai, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
17067005A0EBBDDA152B423715D32628

File PE Metadata
Compilation timestamp:
6/9/2013 3:32:15 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:Ldd00eBPtXmugZ5WLnaB18NFc+sboBCHe2Gc5B:LdFWXmu053ZoWGk

Entry address:
0x3370

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, A8, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, FE, 24, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 3B, 74, 40, 00, FF, 15, 58, 71, 40, 00, 68, 30, 74, 40, 00, 68, C0, 33, 42, 00, E8, F0, 23, 00, 00, FF, 15, B0, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, DE, 23, 00, 00...
 
[+]

Entropy:
7.9923

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file setup377.exe has been seen being distributed by the following URL.

Remove setup377.exe - Powered by Reason Core Security