ykqapa.exe

The executable ykqapa.exe has been detected as malware by 33 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Uxodiqydycutw’. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server. While running, it connects to the Internet address mallet9.wikipolo.com on port 80 using the HTTP protocol.
Version:
3.21.31540.60607

MD5:
9de973750241a911ce63014f0391390f

SHA-1:
41cb94dea483647e5e0e95416f94460d787b8545

SHA-256:
04d0651d889721129620472580459242f69d6b842af2b0ecf62034255fe2df8b

Scanner detections:
33 / 68

Status:
Malware

Analysis date:
11/30/2024 8:01:24 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.12089388
821

Agnitum Outpost
Trojan.Kryptik
7.1.1

AhnLab V3 Security
Trojan/Win32.Kovter
2014.11.06

Avira AntiVirus
TR/Crypt.ZPACK.106476
7.11.183.114

avast!
Win32:Dropper-gen [Drp]
141025-0

AVG
Win32/Cryptor
2014.0.4189

Bitdefender
Trojan.Generic.12089388
1.0.20.1550

Bkav FE
HW32.Packed
1.3.0.4959

Clam AntiVirus
Win.Trojan.Agent-811995
0.98/21411

Comodo Security
TrojWare.Win32.Spy.Zbot.UNB
20045

Dr.Web
Trojan.Siggen6.22973
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Generic.12089388
8.14.11.06.12

ESET NOD32
Win32/Kryptik.CPIE (variant)
8.10678

Fortinet FortiGate
W32/Kryptik.CJJL!tr
11/6/2014

F-Prot
W32/A-ee7ca822
v6.4.7.1.166

F-Secure
Trojan.Generic.12089388
11.2014-06-11_5

G Data
Trojan.Generic.12089388
14.11.24

K7 AntiVirus
Trojan
13.185.13965

Kaspersky
Trojan-Spy.Win32.Zbot
15.0.0.494

Malwarebytes
Spyware.Passwords.ED
v2014.11.06.12

McAfee
Packed-CR!9DE973750241
5600.6955

Microsoft Security Essentials
PWS:Win32/Zbot
1.11104

MicroWorld eScan
Trojan.Generic.12089388
15.0.0.945

NANO AntiVirus
Trojan.Win32.Zbot.dieozv
0.28.6.62995

nProtect
Trojan.Generic.12089388
14.11.10.01

Panda Antivirus
Trj/Genetic.gen
14.11.11.09

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.11.11.21

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.141104

Sophos
Troj/Agent-AJVX
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Cryptor
10255

Vba32 AntiVirus
Heur.Trojan.Hlux
3.12.26.3

VIPRE Antivirus
Threat.4150696
34232

File size:
284.7 KB (291,525 bytes)

Product version:
3.21.31540.60607

Original file name:
mkosena.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\ymexgoub\ykqapa.exe

File PE Metadata
Compilation timestamp:
4/26/2010 3:00:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:x8qKmfxXM1OS+NQKtJyPY5/wfkO/teym2tVgZZRWwzuJW31vR+J8QnF3uwQ:xtKcxuGONYZqteym2t27RXz2W31vR0xu

Entry address:
0xD700

Entry point:
55, 8B, EC, 81, EC, 2C, 01, 00, 00, BA, 9A, 00, 00, 00, EB, 05, 33, C3, 89, 45, 80, 53, 83, C0, CD, EB, 4D, 33, D8, 89, 55, F8, 81, F9, 98, 10, 14, 9A, 74, 40, BE, 09, 00, 00, 00, 89, B5, 08, FF, FF, FF, 83, EB, C7, EB, 30, 83, EA, 59, EB, 2B, 81, F9, 8D, 33, 00, 00, 75, 23, BF, A8, 00, 00, 00, 83, E7, 89, EB, 19, 68, 00, 4D, 92, D8, 68, 00, 1A, 40, CA, 50, 53, 68, 00, BB, A1, E8, E8, B2, 18, 00, 00, 83, C4, 14, 56, EB, 64, 81, C1, 00, 02, 30, 28, 8B, FA, 6A, 4D, 6A, 8D, 68, 00, F2, 53, 3A, E8, D5, 17, 00...
 
[+]

Entropy:
7.8568

Developed / compiled with:
Microsoft Visual C++

Code size:
100 KB (102,400 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Uxodiqydycutw

Command:
C:\users\{user}\appdata\roaming\ymexgoub\ykqapa.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to mallet9.wikipolo.com  (46.244.10.228:80)

TCP (HTTP SSL):
Connects to gw018.lphbs.com  (199.127.194.145:443)

TCP (HTTP SSL):
Connects to ec2-54-243-163-87.compute-1.amazonaws.com  (54.243.163.87:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a173-223-238-176.deploy.static.akamaitechnologies.com  (173.223.238.176:80)

Remove ykqapa.exe - Powered by Reason Core Security