SSFK.exe

TODO: <产品名>

Beijing Xingyunwang Technology Co., Ltd

The application SSFK.exe by Beijing Xingyunwang Technology Co. has been detected as a potentially unwanted program by 13 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “SSFK”. While running, it connects to the Internet address a9.a2.a86c.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
TODO: <公司名>  (signed by Beijing Xingyunwang Technology Co., Ltd)

Product:
TODO: <产品名>

Description:
TODO: <文件说明>

Version:
2.0.6.50

MD5:
6709b98a033d92dcad4422f856f1e656

SHA-1:
3f14dd2494bcd793cfeb7cb4da30329c5aee4861

SHA-256:
033ce63493c6988947f9505c287a7e89261be34d3b45fa4affdc98d01331ebf0

Scanner detections:
13 / 68

Status:
Potentially unwanted

Analysis date:
12/24/2024 5:25:51 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Trojan/Win32.PcClient
2015.11.20

Arcabit
PUP.Adware.ELEX
1.0.0.597

Baidu Antivirus
Adware.Win32.Elex
4.0.3.151120

Bitdefender
Gen:Variant.Application.Jaik.9201
1.0.20.1620

Comodo Security
Application.Win32.ELEX.F
23623

Dr.Web
Adware.Mutabaha.722
9.0.1.0324

ESET NOD32
Win32/ELEX.FO potentially unwanted (variant)
9.12596

F-Secure
Gen:Variant.Application.Jaik
11.2015-20-11_6

G Data
Gen:Variant.Application.Jaik.9201
15.11.25

IKARUS anti.virus
AdWare.Agent
t3scan.1.9.5.0

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.1093

MicroWorld eScan
Gen:Variant.Application.Jaik.9201
16.0.0.972

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1077

File size:
166.7 KB (170,656 bytes)

Product version:
2.0.6.50

Copyright:
Copyright (C) 2015

Original file name:
SSFK.exe

File type:
Executable application (Win32 EXE)

Language:
Chinese (Simplified, China)

Common path:
C:\Program Files\sfk\ssfk.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
11/19/2015 2:57:55 PM

Valid to:
6/21/2016 4:07:00 PM

Subject:
CN="Beijing Xingyunwang Technology Co., Ltd", O="Beijing Xingyunwang Technology Co., Ltd", L=Beijing, S=Beijing, C=CN

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112126144ECEFC2FE742857775D647DB1494

File PE Metadata
Compilation timestamp:
11/19/2015 2:44:45 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:zMj2SrLZzUWpY7woCFoAG+sdckUsr0J+jR1oZxb42r/qE:zkBrLZRpYeGjL1r0JbP99

Entry address:
0x10670

Entry point:
E8, F9, 69, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 50, 4D, 42, 00, E8, 1A, 15, 00, 00, E8, C6, 6B, 00, 00, 0F, B7, F0, 6A, 02, E8, 8C, 69, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 1B, 66, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.2376

Code size:
115 KB (117,760 bytes)

Service
Display name:
SSFK

Description:
System Agent Service

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a9.dd.f617.ip4.static.sl-reverse.com  (23.246.221.169:80)

TCP (HTTP):
Connects to 83.b4.c1ad.ip4.static.sl-reverse.com  (173.193.180.131:80)

TCP (HTTP):
Connects to c1.2f.6132.ip4.static.sl-reverse.com  (50.97.47.193:80)

TCP (HTTP):
Connects to a9.a2.a86c.ip4.static.sl-reverse.com  (108.168.162.169:80)

TCP (HTTP):
Connects to a4.c8.24ae.ip4.static.sl-reverse.com  (174.36.200.164:80)

TCP (HTTP):
Connects to 74.e8.2bd0.ip4.static.sl-reverse.com  (208.43.232.116:80)

TCP (HTTP):
Connects to 43.f7.24ae.ip4.static.sl-reverse.com  (174.36.247.67:80)

Remove SSFK.exe - Powered by Reason Core Security