bit4a4b.tmp.exe

Shuang Wu

The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from gsf-cf.softonic.com.
Publisher:
Shuang Wu  (signed and verified)

MD5:
b1e096266f1e90dd0265d8a8e9ddec23

SHA-1:
e5a4fc1a125596ab7fe7f69793468a8b92713ed2

SHA-256:
76292f335fa92f0710d83b3fec08ac45df4f0e5b5018479f9c4b79c7602659f0

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 6:22:07 AM UTC  (today)

File size:
21.7 MB (22,769,480 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\bit4a4b.tmp.exe

Digital Signature
Signed by:

Authority:
The USERTRUST Network

Valid from:
8/30/2010 8:00:00 AM

Valid to:
8/30/2013 7:59:59 AM

Subject:
CN=Shuang Wu, O=Shuang Wu, STREET="4 Floor, No. 1118 Yu Yuan Road", L=Shanghai, S=Shanghai, PostalCode=210050, C=CN

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
1CCFA257A1CCF9E9400AFEA2EEC98175

File PE Metadata
Compilation timestamp:
4/10/2010 8:19:31 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
393216:ZyVFnGoblOFxkWDNGdM2iT9b2bOZn1CWUw4Gq1GO+Nn+mAWj2K1AfgPMIgP:ZyjNblOS2d9KGYX8+Q6gPp

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Entropy:
7.9999

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file bit4a4b.tmp.exe has been seen being distributed by the following URL.

http://gsf-cf.softonic.com/e5a/4fc/.../file?SD_used=0&channel=WEB&fdh=no&id_file=63600&instance=softonic_it&type=PROGRAM&Expires=1477975091&Signature=bTyhuwaiIKi-cOBwrl3gaNsnjyApMDta~DAXIFVxXn23ed6O9ivK~OKcctoCul4qhRvAhsDYc80bFguO0V6TylIhkFHHI~sVF3ktWI~efNkGnQ4--qqnTkcD7px1j~FXaM82pcrsrPEVxOsk4Lmo68-5d6kc44IYugA4ha1pQ3A_&Key-Pair-Id=APKAJUA62FNWTI37JTGQ&filename=mpcstar_5.2_setup.exe

Scan bit4a4b.tmp.exe - Powered by Reason Core Security