turbomailer-setup.exe

The executable turbomailer-setup.exe has been detected as malware by 41 anti-virus scanners. This is a setup and installation application, however the file is not signed with an authenticode signature from a trusted source. The file is most likely infected with the Neshta virus, a Russian virus that gathers system information and send it to a remote command and cotrol server. The file has been seen being downloaded from www.xellsoft.com.
MD5:
20a0b4116caf85885a69a664d7ad873c

SHA-1:
36e8cddc92a1d83efb81e68e83c4ca2f6d75c379

SHA-256:
a1468795483b1d70ae5267cc9149882a60fc3f3ee922f999259548badf534721

Scanner detections:
41 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
12/27/2024 7:13:04 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Neshta.A
432

Agnitum Outpost
Win32.Neshta.A
7.1.1

AhnLab V3 Security
Win32/Neshta
2014.09.08

Avira AntiVirus
W32/Neshta.A
7.11.171.26

avast!
Win32:Apanas [Trj]
2014.9-151129

AVG
Worm/Delf
2016.0.2910

Baidu Antivirus
Virus.Win32.Neshta.$a
4.0.3.151129

Bitdefender
Win32.Neshta.A
1.0.20.1665

Bkav FE
W32.NeshtaB.PE
1.3.0.4959

Clam AntiVirus
W32.Neshuta.A
0.98/21411

Comodo Security
Win32.Neshta.A
19446

Dr.Web
Win32.HLLP.Neshta
9.0.1.0333

Emsisoft Anti-Malware
Win32.Neshta
8.15.11.29.01

ESET NOD32
Win32/Neshta
9.10379

Fortinet FortiGate
W32/Neshta.A
11/29/2015

F-Prot
W32/HLLP.41472
v6.4.7.1.166

F-Secure
Win32.Neshta.A
11.2015-29-11_1

G Data
Win32.Neshta
15.11.24

IKARUS anti.virus
Virus.Win32.Neshta
t3scan.1.7.5.0

K7 AntiVirus
Virus
13.183.13286

Kaspersky
Virus.Win32.Neshta
14.0.0.1047

McAfee
W32/HLLP.41472.e
5600.6566

Microsoft Security Essentials
1.10904

MicroWorld eScan
Win32.Neshta.A
16.0.0.999

NANO AntiVirus
Trojan.Win32.Neshta.cwfstr
0.28.2.61942

Norman
Neshta.C
11.20151129

nProtect
Virus/W32.Neshta
14.09.07.01

Panda Antivirus
W32/Neshta.A
15.11.29.01

Qihoo 360 Security
Virus.Win32.Neshta.B
1.0.0.1015

Quick Heal
W32.Neshta.A
11.15.14.00

Reason Heuristics
Threat.Win.Reputation.IMP
15.11.29.13

Rising Antivirus
PE:Win32.Netsha.a!411233
23.00.65.151127

Sophos
W32/Bloat-A
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-FlyStudio
9478

Total Defense
Win32/Neshta.A
37.0.11166

Trend Micro House Call
PE_NESHTA.A
7.2.333

Trend Micro
PE_NESHTA.A
10.465.29

Vba32 AntiVirus
Virus.Win32.Neshta.a
3.12.26.3

VIPRE Antivirus
Virus.Win32.Neshta.a
32888

ViRobot
Win32.Neshta.B
2011.4.7.4223

Zillya! Antivirus
Virus.Neshta.Win32.1
2.0.0.1913

File size:
3 MB (3,173,891 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\turbomailer-setup.exe

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:o8Fl84qUQhj3J2CBCoX05otUScs8QKkc7LkCv8:TS4q5jZ2K1WSHCv8

Entry address:
0x80E4

Entry point:
55, 8B, EC, 83, C4, E0, 33, C0, 89, 45, E0, 89, 45, E8, 89, 45, E4, 89, 45, EC, B8, 54, 80, 40, 00, E8, 12, BE, FF, FF, 33, C0, 55, 68, 20, 82, 40, 00, 64, FF, 30, 64, 89, 20, B8, A8, 91, 40, 00, B9, 0B, 00, 00, 00, BA, 0B, 00, 00, 00, E8, 5C, EF, FF, FF, B8, B4, 91, 40, 00, B9, 09, 00, 00, 00, BA, 09, 00, 00, 00, E8, 48, EF, FF, FF, B8, C0, 91, 40, 00, B9, 03, 00, 00, 00, BA, 03, 00, 00, 00, E8, 34, EF, FF, FF, B8, DC, 91, 40, 00, B9, 03, 00, 00, 00, BA, 03, 00, 00, 00, E8, 20, EF, FF, FF, A1, 10, 92, 40...
 
[+]

Entropy:
7.9913

Developed / compiled with:
Microsoft Visual C++

Code size:
29 KB (29,696 bytes)

The file turbomailer-setup.exe has been seen being distributed by the following URL.

Remove turbomailer-setup.exe - Powered by Reason Core Security