allkt.exe

The application allkt.exe has been detected as a potentially unwanted program by 4 anti-malware scanners.
Version:
1, 0, 0, 2

MD5:
1d8191d6bcb0134b957fe47c554e9e76

SHA-1:
d3222eb7645fcfaa6fcdfb7a0bb17c9addc7c693

SHA-256:
8da953346bae99aa9b9861277751ecf1560a12313a97d6048e98184f7837c7cd

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 7:03:08 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Adware.Kraddare.LF (variant)
10.14190

K7 AntiVirus
Trojan-Downloader
13.241.21011

Qihoo 360 Security
HEUR/QVM07.1.0000.Malware.Gen
1.0.0.1120

Rising Antivirus
Malware.Heuristic!ET (rdm+)
23.00.65.16926

File size:
112 KB (114,688 bytes)

Product version:
1, 0, 0, 2

Copyright:
Copyright (C) 2015

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\allkeytab\allkt.exe

File PE Metadata
Compilation timestamp:
9/28/2016 11:39:51 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
1536:E/w+cnGAHW5Ku4KIPqkl8Vnd+tKvZPGK7UT5Zcz4YQJ564n:6muKu4KMqkl8nvZeKAvs4YQJwo

Entry address:
0xE81F

Entry point:
55, 8B, EC, 6A, FF, 68, 48, 1E, 41, 00, 68, 84, E9, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 68, 53, 56, 57, 89, 65, E8, 33, DB, 89, 5D, FC, 6A, 02, FF, 15, 20, 13, 41, 00, 59, 83, 0D, D8, 5A, 41, 00, FF, 83, 0D, DC, 5A, 41, 00, FF, FF, 15, CC, 12, 41, 00, 8B, 0D, CC, 5A, 41, 00, 89, 08, FF, 15, D0, 12, 41, 00, 8B, 0D, C8, 5A, 41, 00, 89, 08, A1, D4, 12, 41, 00, 8B, 00, A3, D4, 5A, 41, 00, E8, 29, 01, 00, 00, 39, 1D, C0, 58, 41, 00, 75, 0C, 68, B4, E9, 40, 00, FF, 15, D8, 12...
 
[+]

Entropy:
5.5455

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
64 KB (65,536 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to 15.234.212.118.adsl-pool.jx.chinaunicom.com  (118.212.234.15:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a173-223-227-34.deploy.static.akamaitechnologies.com  (173.223.227.34:80)

TCP (HTTP SSL):
Connects to hn.kd.ny.adsl  (182.118.31.44:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a173-223-227-58.deploy.static.akamaitechnologies.com  (173.223.227.58:80)

TCP (HTTP):
Connects to a173-223-227-19.deploy.static.akamaitechnologies.com  (173.223.227.19:80)

TCP (HTTP):
Connects to a173-223-227-18.deploy.static.akamaitechnologies.com  (173.223.227.18:80)

TCP (HTTP):
Connects to a118-215.57-156.deploy.akamaitechnologies.com  (118.215.57.156:80)

TCP (HTTP):
Connects to cache.google.com  (59.18.49.55:80)

TCP (HTTP):

TCP (HTTP SSL):
Connects to 14.234.212.118.adsl-pool.jx.chinaunicom.com  (118.212.234.14:443)

TCP (HTTP SSL):
Connects to 13.234.212.118.adsl-pool.jx.chinaunicom.com  (118.212.234.13:443)

TCP (HTTP SSL):
Connects to 114.60.204.221.adsl-pool.sx.cn  (221.204.60.114:443)

Remove allkt.exe - Powered by Reason Core Security