3ksijdakk.exe

Xin Zhou

The executable 3ksijdakk.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from dgkytklfjrqkb.cloudfront.net. While running, it connects to the Internet address server-54-230-216-99.mrs50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Xin Zhou  (signed and verified)

MD5:
d6f98e60a02202a3190b26abc4a27b80

SHA-1:
d6a7f71b21a89148623a04b2474578e8d2132aa0

SHA-256:
5614ee2c9776b5d7e7d70f8993517929f48ec0cf14c5840d667a25b5b5df8561

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/23/2024 5:50:01 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.12.10

File size:
400.7 KB (410,328 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\3ksijdakk.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/24/2017 1:00:00 AM

Valid to:
3/23/2017 12:59:59 AM

Subject:
CN=Xin Zhou, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
72EC90B1643CA029509FA16F3751C132

File PE Metadata
Compilation timestamp:
2/9/2017 11:03:05 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x6D85

Entry point:
E8, 5F, D0, FF, FF, E9, 83, 47, 00, 00, 55, 8B, EC, 8B, 4D, 08, 83, F9, FE, 75, 15, E8, B5, 2C, 00, 00, 83, 20, 00, E8, 0D, FB, FF, FF, C7, 00, 09, 00, 00, 00, EB, 42, 85, C9, 78, 26, 3B, 0D, 0C, 5A, 46, 00, 73, 1E, 8B, C1, 83, E1, 1F, C1, F8, 05, C1, E1, 06, 8B, 04, 85, B8, 2E, 46, 00, F6, 44, 08, 04, 01, 74, 05, 8B, 04, 08, 5D, C3, E8, 76, 2C, 00, 00, 83, 20, 00, E8, CE, FA, FF, FF, C7, 00, 09, 00, 00, 00, E8, 67, A9, FF, FF, 83, C8, FF, 5D, C3, C7, 01, 98, C3, 45, 00, E9, 37, 2C, 00, 00, 55, 8B, EC, 83...
 
[+]

Code size:
360 KB (368,640 bytes)

The file 3ksijdakk.exe has been seen being distributed by the following URL.

http://dgkytklfjrqkb.cloudfront.net/.../yomz.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-85-63-135.lhr50.r.cloudfront.net  (52.85.63.135:80)

TCP (HTTP):
Connects to server-54-230-216-192.mrs50.r.cloudfront.net  (54.230.216.192:80)

TCP (HTTP):
Connects to server-54-192-55-95.jfk6.r.cloudfront.net  (54.192.55.95:80)

TCP (HTTP):
Connects to server-54-192-19-203.iad12.r.cloudfront.net  (54.192.19.203:80)

TCP (HTTP):
Connects to server-54-230-216-99.mrs50.r.cloudfront.net  (54.230.216.99:80)

TCP (HTTP):
Connects to server-54-192-55-50.jfk6.r.cloudfront.net  (54.192.55.50:80)

TCP (HTTP):
Connects to server-54-230-216-104.mrs50.r.cloudfront.net  (54.230.216.104:80)

TCP (HTTP):
Connects to server-54-192-55-92.jfk6.r.cloudfront.net  (54.192.55.92:80)

TCP (HTTP):
Connects to server-52-85-83-60.lax1.r.cloudfront.net  (52.85.83.60:80)

TCP (HTTP):
Connects to server-54-230-216-73.mrs50.r.cloudfront.net  (54.230.216.73:80)

TCP (HTTP):
Connects to server-54-230-187-117.cdg51.r.cloudfront.net  (54.230.187.117:80)

TCP (HTTP):
Connects to server-52-85-63-187.lhr50.r.cloudfront.net  (52.85.63.187:80)

TCP (HTTP):
Connects to server-52-84-246-91.sfo20.r.cloudfront.net  (52.84.246.91:80)

TCP (HTTP):
Connects to server-52-84-246-150.sfo20.r.cloudfront.net  (52.84.246.150:80)

TCP (HTTP):
Connects to server-54-230-216-4.mrs50.r.cloudfront.net  (54.230.216.4:80)

TCP (HTTP):
Connects to server-54-192-55-246.jfk6.r.cloudfront.net  (54.192.55.246:80)

TCP (HTTP):
Connects to server-54-192-55-116.jfk6.r.cloudfront.net  (54.192.55.116:80)

TCP (HTTP):
Connects to server-52-85-83-145.lax1.r.cloudfront.net  (52.85.83.145:80)

TCP (HTTP):
Connects to server-54-230-95-89.fra2.r.cloudfront.net  (54.230.95.89:80)

TCP (HTTP):
Connects to server-54-230-95-53.fra2.r.cloudfront.net  (54.230.95.53:80)

Remove 3ksijdakk.exe - Powered by Reason Core Security