wnrr521tr.exe

The executable wnrr521tr.exe has been detected as malware by 15 anti-virus scanners. The program is a setup application that uses the Self-extracting archive installer, however the file is not signed with an authenticode signature from a trusted source. Accoriding to the detections, this has been classified as a kyelogger which is capable of recoring a user's keystrokes. The file has been seen being downloaded from fra-7m18-stor03.uploaded.net.
MD5:
23ace0a927303a28e088ae4f4b6bbe8a

SHA-1:
63c6119d1a9153c78163bbfebdd04a5d24fb2094

SHA-256:
9003a994e1c82378cfb1913123906971206a61304ddcc677ff0532f76fc477dd

Scanner detections:
15 / 68

Status:
Malware

Explanation:
The software cotains keystroke monitoring/logging capablities which may or may not be installed without the user's knowledge.

Analysis date:
12/26/2024 6:18:30 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
BDS/Agent.110080.7
8.3.1.6

avast!
MSIL:GenMalicious-DNQ [Trj]
2014.9-150629

Dr.Web
infected with BackDoor.Bladabindi.892
9.0.1.0180

Emsisoft Anti-Malware
Trojan.Generic.12739850
8.15.06.29.03

ESET NOD32
MSIL/Bladabindi.F trojan
9.7.0.302.0

F-Secure
Trojan.Generic.12739850
11.2015-29-06_2

Kaspersky
Trojan-Spy.MSIL.KeyLogger
14.0.0.1814

Malwarebytes
Trojan.MSIL.Keylogger
v2015.06.29.03

McAfee
RDN/Generic BackDoor!bbq
5600.6720

Microsoft Security Essentials
Threat.Undefined
1.201.130.0

Norman
Trojan.Generic.12739850
11.20150629

Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.6.28.23

Sophos
Mal/Generic-S
4.98

VIPRE Antivirus
Threat.4150696
40830

File size:
4.4 MB (4,580,528 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Self-extracting archive

Common path:
C:\users\{user}\downloads\wnrr521tr.exe

File PE Metadata
Compilation timestamp:
2/15/2015 10:00:31 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:BF4nyE+kUOTQBV4AW+F2otUYuVXPzIfj7w1/ur71j2t9v8:CyrROQV4P62RVfc7cBurJ8v8

Entry address:
0x1D7CB

Entry point:
E8, 85, 63, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 82, FC, FF, FF, C7, 06, 20, B2, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, 20, B2, 42, 00, E9, 37, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, 20, B2, 42, 00, E8, 24, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, 52, CA, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Code size:
162 KB (165,888 bytes)

The file wnrr521tr.exe has been seen being distributed by the following URL.

Remove wnrr521tr.exe - Powered by Reason Core Security