wodenorgawo.exe

The executable wodenorgawo.exe has been detected as malware by 3 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘wodenorgawo’. While running, it connects to the Internet address cluster007.ovh.net on port 80 using the HTTP protocol.
MD5:
dd779de98a0ac2e92cecb3a8d4fe6f66

SHA-1:
ae9bb62e020be979604961a0c5b474e3759877d5

SHA-256:
3edde9b3febcb08ba5803d5eee10c7017ebe513d92b2f9d02e01651bb4f00529

Scanner detections:
3 / 68

Status:
Malware

Analysis date:
12/26/2024 5:32:35 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.DownLoad.64914
9.0.1.05190

ESET NOD32
Win32/Wigon.PI trojan
6.3.12010.0

F-Secure
Variant.Dyreza.5
5.15.154

File size:
109.5 KB (112,128 bytes)

File type:
Executable application (Win32 EXE)

Language:
Portekizce (Brezilya)

Common path:
C:\users\user\wodenorgawo.exe

File PE Metadata
Compilation timestamp:
9/4/2014 12:21:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0xD4BB

Entry point:
55, 8B, EC, 6A, FF, 68, C8, 7E, 41, 00, 68, C8, 43, 41, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, B4, 70, 41, 00, 33, D2, 8A, D4, 89, 15, 20, CE, 41, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 1C, CE, 41, 00, C1, E1, 08, 03, CA, 89, 0D, 18, CE, 41, 00, C1, E8, 10, A3, 14, CE, 41, 00, 6A, 01, E8, 34, FF, FF, FF, 59, 85, C0, 75, 08, 6A, 1C, E8, AB, 6A, 00, 00, 59, E8, A3, F9, FF, FF, 85, C0, 75, 08, 6A, 10, E8, 9A, 6A, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
85 KB (87,040 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
wodenorgawo

Command:
C:\users\user\wodenorgawo.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to cluster007.ovh.net  (213.186.33.18:80)

TCP (HTTP):
Connects to avalon.idns6.com  (66.85.166.162:80)

TCP (HTTP):
Connects to aamoiaqsme.c05.gridserver.com  (70.32.68.193:80)

Remove wodenorgawo.exe - Powered by Reason Core Security