yacdl.exe

px ins

px ins ltd

The application yacdl.exe has been detected as a potentially unwanted program by 17 anti-malware scanners. While running, it connects to the Internet address 75.126.4.200-static.reverse.softlayer.com on port 80 using the HTTP protocol.
Publisher:
px ins ltd

Product:
px ins

Version:
8.0.12.107

MD5:
56d0c985bf2c483ffda6b47628e67e3e

SHA-1:
bb31c77f16d758c4f8f1aa6df5493e1a72ba38db

SHA-256:
a02392bf184ea22b305a20b11c130b3dff8be59dbad51b98d2be2460e576ae49

Scanner detections:
17 / 68

Status:
Potentially unwanted

Analysis date:
12/27/2024 8:52:51 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.145893
5745241

Arcabit
Trojan.Zusy.D239E5
1.0.0.425

avast!
Win32:Dropper-gen [Drp]
2014.9-150707

Baidu Antivirus
Hacktool.Win32.AdLoad
4.0.3.15617

Bitdefender
Gen:Variant.Zusy.145893
1.0.20.840

Emsisoft Anti-Malware
Gen:Variant.Zusy.145893
10.0.0.5366

ESET NOD32
Win32/ELEX.ED potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Zusy.145893
5.14.151

G Data
Gen:Variant.Zusy.145893
15.6.25

Kaspersky
not-a-virus:Downloader.Win32.AdLoad
15.0.0.543

McAfee
GenericR-DUT!702523E088E6
5600.6712

MicroWorld eScan
Gen:Variant.Zusy.145893
16.0.0.504

Norman
Gen:Variant.Zusy.145893
02.06.2015 14:23:46

Panda Antivirus
Trj/Genetic.gen
15.06.17.07

Qihoo 360 Security
HEUR/QVM41.2.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.7.6.23

VIPRE Antivirus
Trojan.Win32.Generic
41380

File size:
726 KB (743,424 bytes)

Product version:
8.0.12.107

Copyright:
Copyright (C) 2010-2014 px ins

Original file name:
px ins

File type:
Executable application (Win32 EXE)

Language:
English (Sydafrika)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\yacdl.exe

File PE Metadata
Compilation timestamp:
6/17/2015 10:12:21 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:NDPTWFAU9uT3l43AO6lWQYCDALc7+ColN59ReaaTtHqB:NDPTBVsFQJ0c7Mlr91aRHq

Entry address:
0xF724

Entry point:
E8, 21, 4D, 00, 00, E9, 7F, FE, FF, FF, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C, 24, 04...
 
[+]

Code size:
90.5 KB (92,672 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to 75.126.4.200-static.reverse.softlayer.com  (75.126.4.200:80)

Remove yacdl.exe - Powered by Reason Core Security