6779.tmp

The file 6779.tmp has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address ru111.activeby.net on port 80 using the HTTP protocol.
MD5:
7da4870b535f8106cdb230f831cb9630

SHA-1:
004b87f96b4676a0c6d463aa64c5c130efee195f

SHA-256:
ab6789269d20ea952ab48f0a443f41105f81fc00425b583436d7dc6580abf637

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/25/2024 12:17:26 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Delf
16.10.16.15

File size:
409.5 KB (419,328 bytes)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\6779.tmp

File PE Metadata
Compilation timestamp:
2/25/2016 6:52:51 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:qPs5XrpT0N+rURET8ywa888888888888W88888888888:h5Xd0NWaE4yw

Entry address:
0x5A968

Entry point:
55, 8B, EC, B9, 0A, 00, 00, 00, 6A, 00, 6A, 00, 49, 75, F9, 53, 56, 57, B8, 00, 65, 45, 00, E8, 10, FE, FA, FF, 33, C0, 55, 68, 2F, AD, 45, 00, 64, FF, 30, 64, 89, 20, 8D, 45, EC, E8, 1A, B5, FF, FF, 8B, 55, EC, B8, 64, 34, 36, 01, E8, F1, C8, FA, FF, E8, F4, 1B, FF, FF, 83, F8, 01, 1B, C0, 40, 84, C0, 0F, 84, 5A, 03, 00, 00, 8D, 55, E4, 33, C0, E8, 40, D0, FB, FF, 8B, 4D, E4, 8D, 45, E8, BA, 4C, AD, 45, 00, E8, 90, CD, FA, FF, 8B, 45, E8, E8, 48, C9, FA, FF, 50, E8, A2, 03, FB, FF, B8, 05, 00, 00, 00, E8...
 
[+]

Entropy:
6.3127

Developed / compiled with:
Microsoft Visual C++

Code size:
356.5 KB (365,056 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to spl30.hosting.reg.ru  (37.140.192.96:80)

TCP (HTTP):
Connects to scp10.hosting.reg.ru  (37.140.192.26:80)

TCP (HTTP):
Connects to ru111.activeby.net  (178.159.250.163:80)

TCP (HTTP):
Connects to hector.fvds.ru  (77.246.158.133:80)

TCP (HTTP):
Connects to fabio-roze.ru  (212.109.218.138:80)

Remove 6779.tmp - Powered by Reason Core Security