setup838416170.exe

The executable setup838416170.exe has been detected as malware by 5 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from servicosdo.sslblindado.com and multiple other hosts.
Version:
0.0.0.0

MD5:
45f95912392e6df3a9a0a64b1b687e02

SHA-1:
122f9a6f3ec042fd7a8c2498ebf53e7b4de66e60

SHA-256:
d1f7b0bec30baf0a9766378f4573ad8342e4cf27fa6085aec4881af9bfd0bc30

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
12/27/2024 3:05:09 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.773206
5813571

Emsisoft Anti-Malware
Gen:Variant.Kazy.773206
16.01.19

ESET NOD32
MSIL/TrojanDownloader.Agent.AHG trojan
7.0.302.0

F-Secure
Variant.Kazy.773206
5.15.21

Norman
Gen:Variant.Kazy.773206
18.01.2016 17:20:53

File size:
421 KB (431,104 bytes)

Product version:
0.0.0.0

Original file name:
Loader-YPESAAVOWA.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup838416170.exe

File PE Metadata
Compilation timestamp:
1/19/2016 10:28:25 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:PR21wbxytDGG2QGG7qGGRkGGCGoGkGGiGGWZou7GGbGGqNGGHQdGXGGo5CfHGCbA:Pwa1ytm8CldwaKNi/KF7

Entry address:
0x5A0FE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
352.5 KB (360,960 bytes)

The file setup838416170.exe has been seen being distributed by the following 2 URLs.

http://65.181.118.3/flashplayer_versoes.php

Remove setup838416170.exe - Powered by Reason Core Security