svchost10.exe

The executable svchost10.exe has been detected as malware by 29 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘WirelessConfig’. While running, it connects to the Internet address text-lb.esams.wikimedia.org on port 443.
MD5:
796837932202b7f91d69e356d059ba23

SHA-1:
19af8a39ddedc286bc31a8e15ea76f98a6ae360c

SHA-256:
d11e580b9f649f578c505f8487a4e97c8e29e66f7ae0c95e6541fd7a47b09aa2

Scanner detections:
29 / 68

Status:
Malware

Analysis date:
11/23/2024 5:59:38 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.92402
991

AegisLab AV Signature
Troj.Dropper.W32.Dapato
2.1.4+

Agnitum Outpost
Trojan.Blocker
7.1.1

AhnLab V3 Security
HEUR/Fakon.mwf
2014.10.30

Avira AntiVirus
Worm/Autorun.Agen.152
7.11.150.150

avast!
Win32:Malware-gen
140516-1

AVG
Trojan horse Agent4.BUNP
2014.0.3950

Bitdefender
Gen:Variant.Zusy.92402
1.0.20.700

Bkav FE
W32.FakeW7Folder.Fam.Trojan
1.3.0.4959

Dr.Web
Trojan.DownLoader11.8575
9.0.1.0140

Emsisoft Anti-Malware
Gen:Variant.Zusy.92402
8.14.05.20.02

ESET NOD32
Win32/Agent.NPN worm
7.0.302.0

Fortinet FortiGate
W32/Dapato.EDU!tr
12/18/2014

F-Secure
Gen:Variant.Zusy.92402
11.2014-20-05_3

G Data
Gen:Variant.Zusy.92402
14.5.24

IKARUS anti.virus
Worm.Win32.Agent
t3scan.1.8.3.0

K7 AntiVirus
Trojan
13.177.12128

Kaspersky
Trojan-Ransom.Win32.Blocker
14.0.0.3839

Malwarebytes
Backdoor.Bot
v2014.05.20.02

MicroWorld eScan
Gen:Variant.Zusy.92402
15.0.0.420

NANO AntiVirus
Trojan.Win32.Blocker.cxzywa
0.28.0.59921

Norman
Obfuscated.H!genr
11.20140520

Panda Antivirus
Trj/CI.A
14.05.20.02

Reason Heuristics
Threat.Win.Reputation.IMP
14.12.18.8

Total Defense
Win32/FakeFLDR_i
37.0.10947

Trend Micro House Call
Mal_OtorunP
7.2.140

Trend Micro
Mal_OtorunP
10.465.20

Vba32 AntiVirus
Hoax.Blocker
3.12.26.3

VIPRE Antivirus
Threat.4657539
29396

File size:
54 KB (55,296 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\svchost10.exe

File PE Metadata
Compilation timestamp:
3/26/2014 3:21:14 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:uBD2jGRH0pYoEzSHOdUuOeHv8s3i6E5nXfUWPYfIc/Qi3qEBQp:MjRHlojO1OeJ3i6EBXlLOUp

Entry address:
0x3A93

Entry point:
E8, 90, 04, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, 81, 40, 00, 89, 0D, F4, 81, 40, 00, 89, 15, F0, 81, 40, 00, 89, 1D, EC, 81, 40, 00, 89, 35, E8, 81, 40, 00, 89, 3D, E4, 81, 40, 00, 66, 8C, 15, 10, 82, 40, 00, 66, 8C, 0D, 04, 82, 40, 00, 66, 8C, 1D, E0, 81, 40, 00, 66, 8C, 05, DC, 81, 40, 00, 66, 8C, 25, D8, 81, 40, 00, 66, 8C, 2D, D4, 81, 40, 00, 9C, 8F, 05, 08, 82, 40, 00, 8B, 45, 00, A3, FC, 81, 40, 00, 8B, 45, 04, A3, 00, 82, 40, 00, 8D, 45, 08, A3, 0C, 82, 40...
 
[+]

Entropy:
5.6588

Code size:
14 KB (14,336 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
WirelessConfig

Command:
C:\users\{user}\appdata\roaming\svchost10.exe


The file svchost10.exe has been seen being distributed by the following URL.

temp:new folder .exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to text-lb.esams.wikimedia.org  (91.198.174.192:443)

TCP (HTTP):
Connects to vip1.g5.cachefly.net  (66.225.197.197:80)

TCP (HTTP):
Connects to a72-247-184-18.deploy.akamaitechnologies.com  (72.247.184.18:80)

Remove svchost10.exe - Powered by Reason Core Security