simpa.exe

The application simpa.exe has been detected as a potentially unwanted program by 4 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. While running, it connects to the Internet address server-54-230-122-232.dfw50.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
da5ca3a13a0ea295f8dc049f4a85edd8

SHA-1:
ae4c8d71ceccd938f92432836a44aa4e62052e41

SHA-256:
264c354850b9839b36cc4fb1763de793e2b3e4016f36062fd546f6e22c0e5540

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 6:55:25 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Malware/Win32.Generic
2016.01.22

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1077

Reason Heuristics
Adware.DownloadShield.Bundle.Meta (M)
16.2.24.0

SUPERAntiSpyware
Trojan.Agent/Gen-Downloader
9371

File size:
171 KB (175,053 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\simpa.exe

File PE Metadata
Compilation timestamp:
8/28/2014 9:10:27 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:lAWEqcrBSMA9uVdmxcz9sP4rSKStY2tT7nC9bHI6vpMjZY3AIfftbYE:lkZNguVdSP4OT+8OrVvoctsE

Entry address:
0x3350

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, A8, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 23, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 3B, 74, 40, 00, FF, 15, 58, 71, 40, 00, 68, 30, 74, 40, 00, 68, C0, 33, 42, 00, E8, 15, 24, 00, 00, FF, 15, B0, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 03, 24, 00, 00...
 
[+]

Entropy:
7.5354

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-84-141-39.yto50.r.cloudfront.net  (52.84.141.39:80)

TCP (HTTP):
Connects to server-54-230-51-45.jfk5.r.cloudfront.net  (54.230.51.45:80)

TCP (HTTP SSL):
Connects to server-54-230-51-202.jfk5.r.cloudfront.net  (54.230.51.202:443)

TCP (HTTP):
Connects to server-54-230-206-30.atl50.r.cloudfront.net  (54.230.206.30:80)

TCP (HTTP):
Connects to server-54-230-51-23.jfk5.r.cloudfront.net  (54.230.51.23:80)

TCP (HTTP):
Connects to server-54-239-132-67.sfo9.r.cloudfront.net  (54.239.132.67:80)

TCP (HTTP):
Connects to server-52-84-126-194.iad16.r.cloudfront.net  (52.84.126.194:80)

TCP (HTTP):
Connects to server-52-85-112-76.ind6.r.cloudfront.net  (52.85.112.76:80)

TCP (HTTP):
Connects to server-52-84-126-100.iad16.r.cloudfront.net  (52.84.126.100:80)

TCP (HTTP):
Connects to server-54-230-5-81.dfw3.r.cloudfront.net  (54.230.5.81:80)

TCP (HTTP):
Connects to server-54-230-51-210.jfk5.r.cloudfront.net  (54.230.51.210:80)

TCP (HTTP):
Connects to server-54-230-51-127.jfk5.r.cloudfront.net  (54.230.51.127:80)

TCP (HTTP):
Connects to server-54-230-5-103.dfw3.r.cloudfront.net  (54.230.5.103:80)

TCP (HTTP):
Connects to server-54-230-206-76.atl50.r.cloudfront.net  (54.230.206.76:80)

TCP (HTTP):
Connects to server-54-230-206-113.atl50.r.cloudfront.net  (54.230.206.113:80)

TCP (HTTP):
Connects to server-54-192-55-162.jfk6.r.cloudfront.net  (54.192.55.162:80)

TCP (HTTP):
Connects to server-54-192-36-17.jfk1.r.cloudfront.net  (54.192.36.17:80)

TCP (HTTP):
Connects to server-54-192-36-156.jfk1.r.cloudfront.net  (54.192.36.156:80)

TCP (HTTP SSL):
Connects to server-54-192-19-37.iad12.r.cloudfront.net  (54.192.19.37:443)

TCP (HTTP):
Connects to server-54-192-19-236.iad12.r.cloudfront.net  (54.192.19.236:80)

Remove simpa.exe - Powered by Reason Core Security