vfmtaio.exe

The executable vfmtaio.exe has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address live.selapa.com on port 80 using the HTTP protocol.
MD5:
8edd60950ffaeaa65a081ede4120f1c8

SHA-1:
617c661aa9c43bc3e7c8402df8b5e18a0977035e

SHA-256:
ce077d8b0b250adac60fd40111b5d71eaec4324e77a38d6670f1794054617e85

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/30/2024 9:04:24 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Downloader.PE (M)
17.1.31.9

File size:
688 KB (704,512 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\vfmtaio.exe

File PE Metadata
Compilation timestamp:
12/9/2006 1:19:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

Entry address:
0x22B93

Entry point:
6A, 60, 68, F8, B7, 42, 00, E8, ED, F7, FF, FF, BF, 94, 00, 00, 00, 8B, C7, E8, 45, F2, FF, FF, 89, 65, E8, 8B, F4, 89, 3E, 56, FF, 15, 84, A0, 42, 00, 8B, 4E, 10, 89, 0D, 28, 3B, 46, 00, 8B, 46, 04, A3, 34, 3B, 46, 00, 8B, 56, 08, 89, 15, 38, 3B, 46, 00, 8B, 76, 0C, 81, E6, FF, 7F, 00, 00, 89, 35, 2C, 3B, 46, 00, 83, F9, 02, 74, 0C, 81, CE, 00, 80, 00, 00, 89, 35, 2C, 3B, 46, 00, C1, E0, 08, 03, C2, A3, 30, 3B, 46, 00, 33, F6, 56, 8B, 3D, 7C, A0, 42, 00, FF, D7, 66, 81, 38, 4D, 5A, 75, 1F, 8B, 48, 3C, 03...
 
[+]

Entropy:
4.1313

Developed / compiled with:
Microsoft Visual C++ v7.0

Code size:
164 KB (167,936 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to live.selapa.com  (173.199.148.208:80)

TCP (HTTP):
Connects to a184-29-23-122.deploy.static.akamaitechnologies.com  (184.29.23.122:80)

TCP (HTTP):
Connects to ip234.208-100-26.static.steadfastdns.net  (208.100.26.234:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to ec2-52-0-217-44.compute-1.amazonaws.com  (52.0.217.44:80)

TCP:
Connects to vlan-132-14-170.comnet.bg  (79.132.14.170:39836)

TCP (HTTP):

TCP:
Connects to vidin-118-184.vidaoptics.com  (89.106.118.184:24682)

TCP (HTTP):
Connects to text-lb.ulsfo.wikimedia.org  (198.35.26.96:80)

TCP:
Connects to host-212-75-9-232.bbccable.net  (212.75.9.232:43808)

TCP:
Connects to host.35-186-213-62.rev.paritel.fr  (62.213.186.35:40737)

TCP:
Connects to 78-63-108-236.static.zebra.lt  (78.63.108.236:40797)

TCP:
Connects to 78-62-85-60.static.zebra.lt  (78.62.85.60:19750)

TCP:
Connects to 78-62-70-79.static.zebra.lt  (78.62.70.79:18946)

TCP:
Connects to 78-62-169-23.static.zebra.lt  (78.62.169.23:40561)

TCP:
Connects to 78-58-96-192.static.zebra.lt  (78.58.96.192:44478)

TCP (HTTP):
Connects to sinkhole-01.sinkhole.tech  (95.211.174.92:80)

TCP:
Connects to nx-dyn-ip16.networx-bg.com  (77.78.24.16:18219)

TCP (HTTP):
Connects to iseeyougo.com  (5.2.189.251:80)

Remove vfmtaio.exe - Powered by Reason Core Security