svchost10.exe

The executable svchost10.exe has been detected as malware by 32 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘WirelessConfig’. While running, it connects to the Internet address text-lb.esams.wikimedia.org on port 443.
MD5:
9087a3c7b433d6d4d122184540482f6d

SHA-1:
f4583b098ecf05f8f7bfcdaf5a97543c2ccced66

SHA-256:
10dffd322cc2c9a689ebbf59ad08120ca859cac97b0af49cc4f0618c46c7ef03

Scanner detections:
32 / 68

Status:
Malware

Analysis date:
11/26/2024 11:12:55 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.92402
864

Agnitum Outpost
Trojan.Blocker
7.1.1

Avira AntiVirus
TR/Zusy.92402
7.11.172.102

avast!
Win32:Malware-gen
2014.9-140924

AVG
Luhe.Fiha.A
2015.0.3342

Baidu Antivirus
Trojan.Win32.Danglo
4.0.3.14924

Bitdefender
Gen:Variant.Zusy.92402
1.0.20.1335

Bkav FE
W32.FakeW7Folder.Fam.Trojan
1.3.0.4959

Comodo Security
UnclassifiedMalware
19522

Dr.Web
Trojan.DownLoader11.18798
9.0.1.0267

Emsisoft Anti-Malware
Gen:Variant.Zusy.92402
8.14.09.24.11

ESET NOD32
Win32/Agent.NPN (variant)
8.10421

Fortinet FortiGate
W32/Agent.NPN!worm
9/24/2014

F-Secure
Gen:Variant.Zusy.92402
11.2014-24-09_4

G Data
Gen:Variant.Zusy.92402
14.9.24

IKARUS anti.virus
Worm.Win32.Agent
t3scan.1.7.8.0

K7 AntiVirus
Trojan
13.183.13379

Kaspersky
Trojan-Dropper.Win32.Dapato
14.0.0.3203

McAfee
RDN/Ransom!eh
5600.6998

Microsoft Security Essentials
Trojan:Win32/Danglo!gmb
1.11005

MicroWorld eScan
Gen:Variant.Zusy.92402
15.0.0.801

NANO AntiVirus
Trojan.Win32.Dapato.dbzcxx
0.28.2.61942

Norman
Obfuscated.H!genr
11.20140924

Panda Antivirus
Trj/CI.A
14.09.24.11

Qihoo 360 Security
Win32/Trojan.05d
1.0.0.1015

Quick Heal
TrojanRansom.Blocker.r5
9.14.14.00

Sophos
Mal/Generic-S
4.98

Total Defense
Win32/FakeFLDR_i
37.0.11181

Trend Micro
Mal_OtorunP
10.465.24

Vba32 AntiVirus
TrojanDropper.Dapato
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
33144

Zillya! Antivirus
Trojan.Blocker.Win32.19350
2.0.0.1924

File size:
54.5 KB (55,808 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\svchost10.exe

File PE Metadata
Compilation timestamp:
4/14/2014 7:38:02 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:J/05iRcdYFtVM1qUQuvc9HzSHUSUuOOXv8s3i6E5nXfUWPYfIc/Qi3qEBQpf:J88OoVM1q8ewf1OO53i6EBXlLOUp

Entry address:
0x3C67

Entry point:
E8, 9C, 04, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, 81, 40, 00, 89, 0D, F4, 81, 40, 00, 89, 15, F0, 81, 40, 00, 89, 1D, EC, 81, 40, 00, 89, 35, E8, 81, 40, 00, 89, 3D, E4, 81, 40, 00, 66, 8C, 15, 10, 82, 40, 00, 66, 8C, 0D, 04, 82, 40, 00, 66, 8C, 1D, E0, 81, 40, 00, 66, 8C, 05, DC, 81, 40, 00, 66, 8C, 25, D8, 81, 40, 00, 66, 8C, 2D, D4, 81, 40, 00, 9C, 8F, 05, 08, 82, 40, 00, 8B, 45, 00, A3, FC, 81, 40, 00, 8B, 45, 04, A3, 00, 82, 40, 00, 8D, 45, 08, A3, 0C, 82, 40...
 
[+]

Entropy:
5.6699

Code size:
14.5 KB (14,848 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
WirelessConfig

Command:
C:\users\{user}\appdata\roaming\svchost10.exe


The file svchost10.exe has been seen being distributed by the following URL.

temp:new folder .exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to text-lb.esams.wikimedia.org  (91.198.174.192:443)

TCP (HTTP):
Connects to vip1.g5.cachefly.net  (66.225.197.197:80)

Remove svchost10.exe - Powered by Reason Core Security