browserserver.exe

Zhixiong Zhao

The executable browserserver.exe has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address e.a0.a86c.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
Zhixiong Zhao  (signed and verified)

Version:
45.2.2454.18

MD5:
9d1c18d7ac4a6cab2ef1b9f49218ed12

SHA-1:
bb92448754a10351a06739f240738c41e57e3a84

SHA-256:
a326871b83a43822f9f23d6a01424259a5f5eb9d2f738592ba7405786c420b3b

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
5/4/2024 5:06:31 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Ghokswa (M)
16.10.17.9

File size:
366.2 KB (375,008 bytes)

Product version:
45.2.2454.18

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ghokswa browser\ghokswa\bin\browserserver.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
6/2/2015 5:30:00 AM

Valid to:
6/2/2016 5:29:59 AM

Subject:
CN=Zhixiong Zhao, OU=Individual Developer, O=No Organization Affiliation, L=Guangzhou, S=Guandong, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
57409EBFEBEAF8B7ABAF024ABACC1A0D

File PE Metadata
Compilation timestamp:
8/27/2015 10:04:46 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:lLuaLdu/koZy53R0AMO2c9AAUotna2PK2ynLr2T74OyktRPzW:lLuaRuMojota9nLr2v4OdDW

Entry address:
0x25922

Entry point:
E8, 3E, 43, 00, 00, E9, 7F, FE, FF, FF, 3B, 0D, 30, 63, 45, 00, 75, 02, F3, C3, E9, 03, 13, 00, 00, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 2C, 85, 45, 00, FF, 15, 20, 52, 44, 00, 85, C0, 75, 18, 56, E8, 99, 4A, 00, 00, 8B, F0, FF, 15, 64, 52, 44, 00, 50, E8, 9E, 4A, 00, 00, 59, 89, 06, 5E, 5D, C3, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 2C, 85, 45, 00, 85, C0, 75, 1D, E8, 6F, 40, 00, 00, 6A, 1E, E8, C5, 40, 00, 00, 68, FF, 00, 00, 00, E8, A9, 37, 00, 00, A1, 2C...
 
[+]

Entropy:
6.4953

Code size:
270 KB (276,480 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to e.a0.a86c.ip4.static.sl-reverse.com  (108.168.160.14:80)

TCP (HTTP):
Connects to ip-172-26-136-17.ec2.internal  (172.26.136.17:80)

TCP (HTTP):
Connects to ip-172-26-136-19.ec2.internal  (172.26.136.19:80)

Remove browserserver.exe - Powered by Reason Core Security