userinit.exe

honey

The executable userinit.exe has been detected as malware by 28 anti-virus scanners. This virus which infects .exe files stops various security software and prevents some core Windows utilities from running. It also tries to download other files from a remote server, including other malware. While running, it connects to the Internet address 19.187.196.5.fr.axspace.com on port 80 using the HTTP protocol.
Product:
honey

Version:
1.00

MD5:
00674f9af37fc87769ec97281bafd239

SHA-1:
8ce5fd1625e562f21435a32cde5ee543b92aa840

SHA-256:
bd43be6bb5aea6ad1aa8aa7d80697c5201c47936a521c4d4b6df1268289dab38

Scanner detections:
28 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
1/13/2025 4:14:40 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Worm/Win32.AutoRun
2012.08.17

Avira AntiVirus
W32/Sality.AT
7.11.40.36

avast!
Win32:Sality
2014.9-161018

AVG
Win32/Sality
2017.0.2587

Bitdefender
DeepScan:Generic.Sality.3.90908185
1.0.20.1460

Clam AntiVirus
BC.Heuristic.Trojan.SusPacked.BF-6.C
0.98/18155

Comodo Security
Virus.Win32.Sality.Gen
13266

Dr.Web
Win32.Sector.22
9.0.1.0292

Emsisoft Anti-Malware
Worm.Win32.VB!IK
8.16.10.18.06

F-Prot
W32/Sality.gen2
v6.4.6.5.141

F-Secure
DeepScan:Generic.Sality.3.90908185
11.2016-18-10_3

G Data
DeepScan:Generic.Sality.3.90908185
16.10.22

IKARUS anti.virus
Worm.Win32.VB
t3scan.1.1.122.0

K7 AntiVirus
Virus
13.147.7506

Kaspersky
Virus.Win32.Sality
14.0.0.-571

McAfee
W32/Autorun.worm.hu
5600.6243

Microsoft Security Essentials
Virus:Win32/Sality.AT
1.163.1557.0

Norman
W32/Sality.BD
11.20161018

Panda Antivirus
W32/Sality.AA
16.10.18.06

Quick Heal
W32.Sality.U
10.16.12.00

Rising Antivirus
Trojan.Win32.FakeFolder.d
23.00.65.161016

Sophos
Mal/Sality-D
4.80

Total Defense
Win32/Sality.AA
37.0.10035

Trend Micro House Call
PE_SALITY.RL
7.2.292

Trend Micro
PE_SALITY.RL
10.465.18

Vba32 AntiVirus
Virus.Win32.Sality.bakc
3.12.18.2

VIPRE Antivirus
Virus.Win32.Sality.at
12674

ViRobot
Win32.Sality.N
2011.4.7.4223

File size:
147.5 KB (151,040 bytes)

Product version:
1.00

Original file name:
honey.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\windows\userinit.exe

File PE Metadata
Compilation timestamp:
9/13/2000 4:53:33 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:t88IFfCCwXFG1zwLv4vGCzwY8ls4DArmVkukZGT7ZpETnIzB:tIhCCd1zDGZerKpTpEj

Entry address:
0x1220

Entry point:
85, F8, 86, F1, B0, 72, 8B, FB, 0F, AF, C6, 69, C7, F0, 51, 2F, FB, 31, FB, 8D, 35, FA, CA, 61, A0, 69, D0, 0B, 78, AC, F6, F7, C3, F7, 79, FF, 56, 68, 49, 6B, 02, 00, 0F, BF, CB, 58, 8B, D7, F2, 35, 89, 60, 02, 00, F3, 89, C7, FE, CA, 8D, 0D, B3, 63, C2, 52, B6, 8F, 89, D6, 45, 2D, 45, 00, 00, 00, 09, D9, 05, 44, 00, 00, 00, 81, F5, 70, 43, 75, 8F, 0F, BF, C9, B7, C7, F7, C1, 2A, EE, 33, C8, 84, E1, 80, FA, 0D, 3D, 14, 03, 00, 00, 0F, 8F, C3, FF, FF, FF, 85, FD, 71, 04, 8B, D9, 2A, E8, F7, C0, 40, 13, D5...
 
[+]

Entropy:
7.2589

Code size:
108 KB (110,592 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 93-89-224-9.fbs.com.tr  (93.89.224.9:80)

TCP (HTTP):
Connects to mailserver40.mylittledatacenter.com  (144.76.167.153:80)

TCP (HTTP):
Connects to 210.151.74.137.fr.axspace.com  (137.74.151.210:80)

TCP (HTTP):
Connects to hv8svg015.neubox.net  (65.99.252.96:80)

TCP (HTTP):
Connects to 19.187.196.5.fr.axspace.com  (5.196.187.19:80)

TCP (HTTP):
Connects to HDRedirect-LB3-890977680.us-east-1.elb.amazonaws.com  (68.168.222.206:80)

Remove userinit.exe - Powered by Reason Core Security