اصغر متصفح بالعالم -ديف بوينت.exe

BlueMountainRipper

Monkey

The executable اصغر متصفح بالعالم -ديف بوينت.exe has been detected as malware by 4 anti-virus scanners. The file has been seen being downloaded from files03.arabsh.com. While running, it connects to the Internet address svr154.fastwebhost.com on port 80 using the HTTP protocol.
Publisher:
Monkey

Product:
BlueMountainRipper

Version:
1.02.0007

MD5:
36108f644fda895d29a2ab2cae69bae8

SHA-1:
d5309377792457cbcf345bba63c205fb8cbf2b36

SHA-256:
f8c22c7349143662bd10148759d7c52d277cbd0de8fbc72e4e65fd135176e093

Scanner detections:
4 / 68

Status:
Malware

Analysis date:
4/25/2024 10:03:23 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:WrongInf-A [Susp]
2014.9-131224

McAfee
Artemis!36108F644FDA
5600.7272

Trend Micro House Call
TROJ_GEN.R0CBH05JC13
7.2.358

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
25494

File size:
284 KB (290,816 bytes)

Product version:
1.02.0007

Original file name:
bmripper.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

File PE Metadata
Compilation timestamp:
4/18/2006 11:32:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:7IDyGXblRHY7g4qdBdLMdxZfLclc/0vqYqz:7W3Bd8xZfLEc/AqJz

Entry address:
0x2BBC

Entry point:
68, E0, D3, 40, 00, E8, EE, FF, FF, FF, 00, 00, 00, 00, 00, 00, 30, 00, 00, 00, 48, 00, 00, 00, 00, 00, 00, 00, 71, D8, 2D, 72, FD, 23, 5D, 4F, 98, 7A, 77, 9F, 81, 6B, 03, F0, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 49, 00, 02, 50, 83, 02, 42, 6C, 75, 65, 4D, 6F, 75, 6E, 74, 61, 69, 6E, 52, 69, 70, 70, 65, 72, 00, 00, F0, 73, 2A, 01, 00, 00, 00, 00, FF, CC, 31, 00, 35, 24, 94, FF, 12, 10, 60, 2B, 46, 80, 10, A0, 63, 1D, 2A, 3D, CF, B5, E4, 0E, 9E, 4A, 85, 93, 46, 93, 71, C0, 0F, 43, 06, 5C, E3, 3A, 4F, AD...
 
[+]

Entropy:
5.9821

Developed / compiled with:
Microsoft Visual Basic v5.0/v6.0

Code size:
268 KB (274,432 bytes)

The file اصغر متصفح بالعالم -ديف بوينت.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip54.ip-142-4-200.net  (142.4.200.54:80)

TCP (HTTP):
Connects to server.host-x3.com  (198.57.207.48:80)

TCP (HTTP):
Connects to svr154.fastwebhost.com  (67.225.171.8:80)