1a09972c1153067d445ba59a1264ff59.exe

The executable 1a09972c1153067d445ba59a1264ff59.exe has been detected as malware by 30 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘1a09972c1153067d445ba59a1264ff59’. While running, it connects to the Internet address ar.libero.it on port 1177.
MD5:
435c40c4d96ea14ab18fb9485b4e8c8c

SHA-1:
5f1b414ccbfe137c22a2dc478539694eb7e12d5c

SHA-256:
19097312032822eb1d4adbd548f7e2137b135d9575942b67fbbdafd7e37a2d7f

Scanner detections:
30 / 68

Status:
Malware

Analysis date:
4/25/2024 5:40:18 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Barys.14592
920

Avira AntiVirus
TR/Spy.Gen5
7.11.30.172

avast!
Win32:Bladabindi-A [Trj]
140617-1

AVG
PSW.ILSpy
2015.0.3398

Baidu Antivirus
Trojan.Win32.Generic
4.0.3.14729

Bitdefender
Gen:Variant.Barys.12841
1.0.20.1050

Comodo Security
TrojWare.MSIL.Spy.Agent.EF
19016

Dr.Web
BackDoor.Bladabindi.1393
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Barys.12841
8.14.07.29.06

ESET NOD32
MSIL/Bladabindi (variant)
8.10172

Fortinet FortiGate
MSIL/Agent.MNB!tr
7/29/2014

F-Prot
W32/MSIL_Troj.AP.gen
4.6.5.141

F-Secure
Gen:Variant.Barys.12841
11.2014-29-07_3

G Data
Gen:Variant.Barys.12841
14.7.24

IKARUS anti.virus
Backdoor.MSIL
t3scan.1.6.1.0

K7 AntiVirus
Backdoor
13.181.12872

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.3486

Malwarebytes
Backdoor.Agent.NIPGen
v2014.07.29.06

McAfee
Generic MSIL.m
5600.7054

Microsoft Security Essentials
Threat.Undefined
1.179.1469.0

MicroWorld eScan
Gen:Variant.Barys.12841
15.0.0.630

NANO AntiVirus
Trojan.Win32.Autoruner.dciaqm
0.28.2.61148

nProtect
Trojan/W32.Jorik.38912.Q
14.07.29.01

Qihoo 360 Security
Malware.QVM03.Gen
1.0.0.1015

Quick Heal
Worm.Necast.J3
7.14.14.00

Rising Antivirus
PE:Trojan.MSIL.UDM!1.9DB7
23.00.65.14727

Sophos
Mal/MSIL-GL
4.98

Trend Micro House Call
BKDR_BLADABI.SMC
7.2.210

Trend Micro
BKDR_BLADABI.SMC
10.465.29

VIPRE Antivirus
Threat.4760176
31208

File size:
38 KB (38,912 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\microsoft\windows\start menu\programs\startup\1a09972c1153067d445ba59a1264ff59.exe

File PE Metadata
Compilation timestamp:
3/11/2013 8:21:35 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:Dl8osX8PzP8yLJmPJYTDu7omh9UgG7PWmqcSH+Tq7yrciJT4Z2Dl6B/M36j6Mhok:Dl9myz9wPAa7omh9rAO7yrpEQaniF3

Entry address:
0xAE9E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
36 KB (36,864 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
1a09972c1153067d445ba59a1264ff59

Command:
"C:\users\{user}\appdata\local\temp\sfne.exe"..


The executing file has been seen to make the following network communication in live environments.

TCP:
Connects to ar.libero.it  (212.52.82.27:1177)

Remove 1a09972c1153067d445ba59a1264ff59.exe - Powered by Reason Core Security