vau183f.tmp.exe

CPU Miner - Setup

LLC

The application vau183f.tmp.exe by LLC has been detected as a potentially unwanted program by 22 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. This is a malicious Bitcoin miner. Bitcoin-mining malware is designed to force computers to generate Bitcoins for cybercriminals' use and consumes computing power. The file has been seen being downloaded from cdn-14b7.kxcdn.com.
Publisher:
Open Source  (signed by LLC )

Product:
CPU Miner - Setup

Version:
1.1

MD5:
db3dc9eaa141f573372c17f332216d06

SHA-1:
d8c65d5ac14a107914e33d4c5d368e0aca1fa48b

SHA-256:
1c718bfbb67ae3b39ca7f783da586e969ea354b25976a81454d1ccec758cea69

Scanner detections:
22 / 68

Status:
Potentially unwanted

Explanation:
The program will mine for BitCoins using the computer's GPU in the background and may be installed and run without the user's knowledge.

Analysis date:
11/24/2024 3:06:20 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.87902
329

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Unwanted/Win32.BitCoinMiner
2015.08.04

Avira AntiVirus
TR/BitCoinMiner.4634424
8.3.1.6

Arcabit
Trojan.Strictor.D1575E
1.0.0.425

avast!
Win32:Miner-B [PUP]
2014.9-160312

Baidu Antivirus
Hacktool.Win32.BitCoinMiner
4.0.3.16312

Bitdefender
Gen:Variant.Strictor.87902
1.0.20.360

Clam AntiVirus
Win.Trojan.Strictor-449
0.98/21511

Dr.Web
Trojan.BtcMine.709
9.0.1.072

Emsisoft Anti-Malware
Gen:Variant.Strictor.87902
8.16.03.12.03

ESET NOD32
Win32/BitCoinMiner.BY potentially unsafe (variant)
10.12038

Fortinet FortiGate
Riskware/BitCoinMiner
3/12/2016

F-Secure
Gen:Variant.Strictor.87902
11.2016-12-03_7

G Data
Gen:Variant.Strictor.87902
16.3.25

IKARUS anti.virus
Trojan.BitCoinMiner
t3scan.1.9.5.0

K7 AntiVirus
Unwanted-Program
13.207.16772

McAfee
Artemis!499FADCF8051
5600.6463

MicroWorld eScan
Gen:Variant.Strictor.87902
17.0.0.216

NANO AntiVirus
Riskware.Nsis.BitCoinMiner.dqgttf
0.30.24.2668

Trend Micro House Call
TROJ_GE.7477C1DA
7.2.72

VIPRE Antivirus
Trojan.Win32.Generic
42606

File size:
4.3 MB (4,484,352 bytes)

Product version:
1.1

Copyright:
2015 - Open Source

Original file name:
cpuminer.exe

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\vau183f.tmp.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
5/6/2015 2:00:00 AM

Valid to:
5/6/2016 1:59:59 AM

Subject:
CN="LLC ""LAYN-PROEKT""", O="LLC ""LAYN-PROEKT""", STREET="Vulitsya Bogdana Khmel''nits''kogo , Budinok 106", L=Lviv, S=Lvivska, PostalCode=79019, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E17C1DB2CCC44BCBE684F843F1CF4F3C

File PE Metadata
Compilation timestamp:
10/7/2014 6:40:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:lhORd08Yy+p0wlM79YLWMvLXDQwj7RReAxQnIskPwEok2rNXdv:lhODYrpPM7i6MvZReyQnIs6uk2ZR

Entry address:
0x3217

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 89, 5C, 24, 20, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 09, A3, B8, 37, 42, 00, E8, C0, 2D, 00, 00, A3, 04, 37, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, B8, EC, 41, 00, FF, 15, 64, 71, 40, 00, 68, E4, 91, 40, 00, 68, 00, 2F, 42, 00, E8, 6A, 2A, 00, 00, FF, 15, B0, 70, 40, 00, BD, 00, 90, 42, 00, 50, 55, E8, 58, 2A...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file vau183f.tmp.exe has been seen being distributed by the following URL.

http://cdn-14b7.kxcdn.com/cdn.exe

Remove vau183f.tmp.exe - Powered by Reason Core Security