svchosts.exe

The executable svchosts.exe has been detected as malware by 24 anti-virus scanners. This is a setup program which is used to install the application. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘mil’. The file has been seen being downloaded from milyoncu.xyz.
MD5:
4cab115bfed2ffce29750872db610e20

SHA-1:
9ceb7e35fae046a92892a87b6bd73bfb512e91fa

SHA-256:
18e7c452e27169fc676872cd64261bcff8cd9787913ff3391a8eb0c53ea8943d

Scanner detections:
24 / 68

Status:
Malware

Analysis date:
11/5/2024 1:38:59 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2069145
756

AhnLab V3 Security
Trojan/Win32.Gen
2015.01.09

Avira AntiVirus
TR/Agent.466432.39
7.11.200.58

avast!
Win32:Malware-gen
2014.9-150110

Baidu Antivirus
Trojan.Win32.ExtenBro
4.0.3.15110

Bitdefender
Trojan.GenericKD.2069145
1.0.20.50

Bkav FE
W32.PosfusresLTG.Trojan
1.3.0.6267

Emsisoft Anti-Malware
Trojan.GenericKD.2069145
8.15.01.10.07

ESET NOD32
Win32/ExtenBro.AE (variant)
9.10985

F-Secure
Trojan.GenericKD.2069145
11.2015-10-01_7

G Data
Trojan.GenericKD.2069145
15.1.24

IKARUS anti.virus
Trojan.Win32.Extenbro
t3scan.1.8.6.0

K7 AntiVirus
Trojan
13.190.14585

Malwarebytes
Trojan.Agent.AI
v2015.01.10.07

McAfee
Artemis!4CAB115BFED2
5600.6890

Microsoft Security Essentials
Trojan:Win32/Kilim.M
1.11302

MicroWorld eScan
Trojan.GenericKD.2069145
16.0.0.30

Norman
Troj_Generic.XYOQI
11.20150110

nProtect
Trojan.GenericKD.2069145
15.01.08.01

Panda Antivirus
Trj/CI.A
15.01.10.07

Qihoo 360 Security
HEUR/QVM11.1.Malware.Gen
1.0.0.1015

Sophos
Mal/Generic-S
4.98

Total Defense
Win32/Tnega.SJFWJCC
37.0.11375

Trend Micro House Call
TROJ_GEN.R047H01A715
7.2.10

File size:
455.5 KB (466,432 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United Kingdom)

Common path:
C:\users\{user}\appdata\roaming\svchosts.exe

File PE Metadata
Compilation timestamp:
1/7/2015 10:30:33 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:zOv5jKhsfoPA+yeVKUCUxP4C902bdRtJJPiLPIoCwxYu:zq5TfcdHj4fmbm/CwxYu

Entry address:
0xF5F30

Entry point:
60, BE, 00, 20, 4A, 00, 8D, BE, 00, F0, F5, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Entropy:
7.8990

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
340 KB (348,160 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
mil

Command:
C:\users\{user}\appdata\roaming\svchosts.exe


The file svchosts.exe has been seen being distributed by the following URL.

Remove svchosts.exe - Powered by Reason Core Security