182002387_monster.exe

Vladislav Belousov

The executable 182002387_monster.exe has been detected as malware by 1 anti-virus scanner. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time.
Publisher:
Reveal from sleep  (signed by Vladislav Belousov)

Product:
Reveal from sleep

Version:
1.13.0.0

MD5:
637b2613ea238e0f6ee316d04086ade6

SHA-1:
7a28e0171c1cdf2a70aa1b482976dc825877e985

SHA-256:
01b604deb2fe6d0bf7837e1c72c8060eca249919f6e313393f3b55c5c77e35a3

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/25/2024 11:55:35 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.4.19

File size:
130.1 KB (133,224 bytes)

Product version:
1.13.0.0

Original file name:
downloader.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\hostinstaller\182002387_monster.exe

Digital Signature
Authority:
StartCom Ltd.

Valid from:
10/31/2015 6:30:20 AM

Valid to:
10/31/2017 7:27:17 PM

Subject:
E=belousov-vladi@mail.ru, CN=Vladislav Belousov, L=Moscow, S=Moscow City, C=RU

Issuer:
CN=StartCom Class 2 Primary Intermediate Object CA, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL

Serial number:
13701625AB3213

File PE Metadata
Compilation timestamp:
2/4/2017 7:23:40 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

Entry address:
0x19E72

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
96 KB (98,304 bytes)

Scheduled Task
Task name:
Soft installer

Trigger:
Daily (Runs daily at 20:21)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to moscow.cdnmail.ru  (217.69.139.110:80)

TCP (HTTP):
Connects to anvir.com  (185.22.234.46:80)

TCP (HTTP SSL):
Connects to static.yandex.net  (178.154.131.217:443)

TCP (HTTP):
Connects to free.optibit.ru  (185.25.62.163:80)

TCP (HTTP):
Connects to cache.google.com  (109.195.233.121:80)

TCP (HTTP):

TCP (HTTP):
Connects to a219-83-126-9.deploy.akamaitechnologies.com  (219.83.126.9:80)

TCP (HTTP):
Connects to a2-16-155-33.deploy.akamaitechnologies.com  (2.16.155.33:80)

TCP (HTTP):
Connects to a104-86-110-216.deploy.static.akamaitechnologies.com  (104.86.110.216:80)

TCP (HTTP):
Connects to a104-103-72-123.deploy.static.akamaitechnologies.com  (104.103.72.123:80)

TCP (HTTP):
Connects to 82-117-169-234.nts.su  (82.117.169.234:80)

Remove 182002387_monster.exe - Powered by Reason Core Security