winlogon.exe

The executable winlogon.exe has been detected as malware by 5 anti-virus scanners. This is a setup program which is used to install the application. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Stress’. The file has been seen being downloaded from dc366.4shared.com.
Version:
1.0.0.0

MD5:
2b33295a66bd2894d590e5f8f5ae87c8

SHA-1:
0fb1c5743b03c4d46dab1d154e2fbfdd63017081

SHA-256:
08b3e4f92045013019018ebe0db0ac44696de0837894fd392a2145b23967f19b

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
11/23/2024 11:01:04 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Dr.Web
Trojan.DownLoader11.43649
9.0.1.05190

Emsisoft Anti-Malware
Gen:Heur.MSIL.Androm
11.5.0.6191

ESET NOD32
MSIL/Kryptik.AOK trojan
8.0.319.0

F-Secure
Heur.MSIL.Androm.3
5.15.96

Norman
Gen:Heur.MSIL.Androm.3
28.05.2016 15:32:18

File size:
124 KB (126,976 bytes)

Product version:
1.0.0.0

Original file name:
DDoS Stress.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\winlogon.exe

File PE Metadata
Compilation timestamp:
5/18/2015 12:56:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
3072:Z0eT8Q/P1kdkH76GCOYwUPxnktqzzJizZ:Z58Q/Nr7fCOYwUPxyqXQ

Entry address:
0x1DBEE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6071

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
112 KB (114,688 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Stress

Command:
C:\users\{user}\appdata\roaming\winlogon.exe


The file winlogon.exe has been seen being distributed by the following URL.

Remove winlogon.exe - Powered by Reason Core Security