video4438.exe

VAJT KOD OOO

The application video4438.exe by VAJT KOD OOO has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address message.katcryo.com on port 80 using the HTTP protocol.
Publisher:
VAJT KOD OOO  (signed and verified)

MD5:
00c598cf63feec04f87b8be1fe5ac81c

SHA-1:
81f66e5d497946e916c5c62e3c7b41255da854eb

SHA-256:
0e924cdd9201698a4e8d2593700b96704e50e155dd8e00ae3bd4b8688d2d7452

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 1:30:54 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Bundler (M)
17.2.22.17

File size:
985 KB (1,008,656 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\video4438.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Subject:
CN="""VAJT KOD"" OOO", O="""VAJT KOD"" OOO", STREET="Kamennoostrovsky Prospect, d 40A", L=saint-petersburg, S=saint-petersburg, PostalCode=197022, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E5456B960087DD09DB108CEDEC31BC30

File PE Metadata
Compilation timestamp:
2/22/2017 12:01:57 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x1520

Entry point:
55, 8B, EC, 6A, FF, 68, 60, 9C, 41, 00, 68, 58, 4C, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, C4, A4, 53, 56, 57, 89, 65, E8, FF, 15, 60, 00, 41, 00, A3, 18, 4D, 4C, 00, A1, 18, 4D, 4C, 00, C1, E8, 08, 25, FF, 00, 00, 00, A3, 24, 4D, 4C, 00, 8B, 0D, 18, 4D, 4C, 00, 81, E1, FF, 00, 00, 00, 89, 0D, 20, 4D, 4C, 00, 8B, 15, 20, 4D, 4C, 00, C1, E2, 08, 03, 15, 24, 4D, 4C, 00, 89, 15, 1C, 4D, 4C, 00, A1, 18, 4D, 4C, 00, C1, E8, 10, 25, FF, FF, 00, 00, A3, 18, 4D, 4C, 00, 6A, 00, E8, 6D...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
60 KB (61,440 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to message.katcryo.com  (185.20.186.52:80)

TCP (HTTP SSL):
Connects to exe.agent.mail.ru  (217.69.139.65:443)

Remove video4438.exe - Powered by Reason Core Security