syshost.exe

The executable syshost.exe has been detected as malware by 1 anti-virus scanner. It runs as a separate (within the context of its own process) windows Service named “syshost32”. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘syshost32’. While running, it connects to the Internet address alinatur.example.com on port 80 using the HTTP protocol.
MD5:
55c2119bf90953239c4105f43347d0ec

SHA-1:
23be57ae22e84b3eb8f47558dee43869c2409e05

SHA-256:
6421c539b4bb0b680a2ddb67066964fe9cd1c3628bfd7b8ee8507199ca00e839

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/25/2024 4:29:30 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Dropper (M)
16.9.19.15

File size:
164 KB (167,936 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\installer\{04ab4bfb-1a7b-91ad-ec7a-fc8ecc597ef0}\syshost.exe

File PE Metadata
Compilation timestamp:
9/19/2016 6:03:55 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

CTPH (ssdeep):
3072:jwMkDBkHUiFGLrZw2XjX3i7Zamd9on6iTmZ2N6:jZDUSU9w2XjkZnd+6iV

Entry address:
0x1A3D6

Entry point:
55, 8B, EC, 6A, FF, 68, B0, 51, 42, 00, 68, 48, BF, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 80, 50, 42, 00, 33, D2, 8A, D4, 89, 15, 04, 8F, 42, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 00, 8F, 42, 00, C1, E1, 08, 03, CA, 89, 0D, FC, 8E, 42, 00, C1, E8, 10, A3, F8, 8E, 42, 00, 6A, 01, E8, 59, 1A, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C2, 00, 00, 00, 59, E8, E6, 0D, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B1, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Entropy:
6.2004

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
144 KB (147,456 bytes)

Service
Display name:
syshost32

Type:
Win32OwnProcess


Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
syshost32

Command:
C:\users\{user}\appdata\local\{d2348105-05f2-1a39-ec57-506dcb7f65b7}\syshost.exe


The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to 201-211-156-206.genericrev.cantv.net  (201.211.156.206:29929)

TCP (HTTP):
Connects to yuprets.fvds.ru  (188.120.255.247:80)

TCP (HTTP):
Connects to lar3xu.example.com  (217.12.199.122:80)

TCP (HTTP):
Connects to alinatur.example.com  (195.123.209.228:80)

TCP (HTTP):
Connects to ops28.werecommendating.com  (91.219.28.33:80)

TCP (HTTP):
Connects to larin31.itldc-customer.net  (195.123.209.87:80)

TCP (HTTP):
Connects to yuprets.example.com  (185.14.30.201:80)

TCP (HTTP):
Connects to 31-202-128-210-kh.maxnet.ua  (31.202.128.210:80)

TCP:
Connects to wlcl-108-10.eduroam-st.b-tu.de  (141.43.108.10:6578)

TCP (HTTP):
Connects to 119-47-184-83.ppp.bbiq.jp  (119.47.184.83:80)

TCP:
Connects to user-31-174-42-162.play-internet.pl  (31.174.42.162:8708)

TCP:
Connects to ip183c46.banglalionwimax.com  (58.97.183.46:6619)

TCP:
Connects to hfc-181-137-69-237.une.net.co  (181.137.69.237:16795)

TCP:
Connects to broadband.actcorp.in  (106.51.171.64:14069)

TCP:
Connects to 27.131.13-66-Users.dfnbd.net  (27.131.13.66:22693)

TCP:
Connects to 219.64.166.125.hyd.dialup.vsnl.net.in  (219.64.166.125:8226)

TCP (HTTP):
Connects to 138615.simplecloud.club  (89.223.26.9:80)

TCP:
Connects to user-46-113-23-6.play-internet.pl  (46.113.23.6:4885)

TCP:
Connects to unknown.interbgc.com  (130.204.70.123:29327)

TCP:
Connects to static-91.215.96.14-tataidc.co.in  (14.96.215.91:31461)

Remove syshost.exe - Powered by Reason Core Security