tmp5c5e.exe

The executable tmp5c5e.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘YQPack’. While running, it connects to the Internet address 40.1e.2fa9.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
MD5:
b9cdfc5c437fcebf8b4acb182fe91d84

SHA-1:
f8d26e02511e242b8f9e25c9fd3915d6cb56e055

SHA-256:
a1e940be09e416fb7c7a15f0416b3c25f974f133f7f61fea3aea3a69a97ce45c

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/24/2024 11:53:45 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Kovter (M)
17.2.27.18

File size:
118.5 KB (121,335 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\microsoft\performance\monitor\temp\tmp5c5e.exe

File PE Metadata
Compilation timestamp:
9/8/2016 7:01:18 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x322B

Entry point:
81, EC, 84, 01, 00, 00, 53, 56, 57, 33, DB, 68, 01, 80, 00, 00, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 89, 5C, 24, 20, C6, 44, 24, 14, 20, FF, 15, 20, 71, 40, 00, FF, 15, AC, 70, 40, 00, 66, 3D, 06, 00, 74, 11, 53, E8, 94, 2F, 00, 00, 3B, C3, 74, 07, 68, 00, 0C, 00, 00, FF, D0, BE, 98, 72, 40, 00, 56, E8, 10, 2F, 00, 00, 56, FF, 15, A8, 70, 40, 00, 8D, 74, 06, 01, 38, 1E, 75, EB, 55, 6A, 09, E8, 67, 2F, 00, 00, 6A, 07, E8, 60, 2F, 00, 00, A3, 24, 37, 42, 00, FF, 15, 44, 70, 40, 00, 53, FF, 15, 88...
 
[+]

Code size:
23.5 KB (24,064 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
YQPack

Command:
C:\users\{user}\appdata\local\yqpack\tmp35c9.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP SSL):
Connects to static.14.147.243.136.clients.your-server.de  (136.243.147.14:443)

TCP (HTTP):
Connects to cache.google.com  (66.171.92.113:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to 40.1e.2fa9.ip4.static.sl-reverse.com  (169.47.30.64:80)

TCP (HTTP SSL):
Connects to ve604.venus.fastwebserver.de  (89.163.140.97:443)

Remove tmp5c5e.exe - Powered by Reason Core Security