commgr.exe

The executable commgr.exe has been detected as malware by 38 anti-virus scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘WindowMessenger’. Infected by an entry-point obscuring polymorphic file infector which will create a peer-to-peer botnet and receives URLs of additional files to download.
MD5:
d395722b5da8b0eecc74b36d232a1825

SHA-1:
85ef61a9e6e3ab4e976bd39ee0b229d2bad88a61

SHA-256:
d24267240285f09be051e38ff3537e6e6186087a4a2c009aacf566ece2178350

Scanner detections:
38 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
5/10/2024 5:39:08 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Agent.AOZO
5535153

Agnitum Outpost
Win32.Sality.BK
7.1.1

AhnLab V3 Security
HEUR/Fakon.mwf
2015.05.23

Avira AntiVirus
W32/Sality.AT
8.3.1.6

avast!
Win32:Kukacka
150521-0

AVG
Win32/Sality
2014.0.4311

Baidu Antivirus
Virus.Win32.Sality.$Emu
4.0.3.15522

Bitdefender
Trojan.Agent.AOZO
1.0.20.710

Bkav FE
W32.Sality.PE
1.3.0.6379

Comodo Security
Virus.Win32.Sality.gen
22210

Dr.Web
Win32.Virut.56
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Agent.AOZO
10.0.0.5366

ESET NOD32
Win32/Sality.NBA virus
7.0.302.0

Fortinet FortiGate
W32/AutoRun.VS!tr
5/22/2015

F-Prot
W32/Sality.gen2
4.6.5.141

F-Secure
Trojan.Agent.AOZO
5.14.151

G Data
Trojan.Agent.AOZO
15.5.25

IKARUS anti.virus
Worm.Win32.AutoRun
t3scan.1.8.9.0

K7 AntiVirus
EmailWorm
13.204.15997

Kaspersky
Virus.Win32.Sality
15.0.0.543

Malwarebytes
Backdoor.Bot
v2015.05.22.02

McAfee
Virus.W32/Autorun.worm.gp
18.0.204.0

Microsoft Security Essentials
Threat.Undefined
1.199.500.0

MicroWorld eScan
Trojan.Agent.AOZO
16.0.0.426

NANO AntiVirus
Trojan.Win32.Cosmu.bmgjr
0.30.24.1636

Norman
Trojan.Agent.AOZO
03.12.2014 13:20:04

nProtect
Virus/W32.Sality.D
15.05.22.01

Panda Antivirus
W32/Sality.AA
15.05.22.02

Quick Heal
W32.Sality.U
5.15.14.00

Rising Antivirus
PE:Worm.VobfusEx!1.99DF
23.00.65.15520

Sophos
Virus 'Mal/Sality-D'
5.14

Total Defense
Win32/Sality.AA
37.1.62.1

Trend Micro House Call
PE_SALITY.RL
7.2.142

Trend Micro
PE_SALITY.RL
10.465.22

Vba32 AntiVirus
Virus.Win32.Sality.bakb
3.12.26.4

VIPRE Antivirus
Threat.4721115
40432

ViRobot
Win32.Sality.Gen.A[h]
2014.3.20.0

Zillya! Antivirus
Virus.Sality.Win32.22
2.0.0.2187

File size:
1.5 MB (1,568,768 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
3/20/2007 5:26:26 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:WbbELf/MJ8cWdi5pV/JNWOVhM2YZ7qpOK3f+Gh:ZdOpNX1h6Z0

Entry address:
0x5581

Entry point:
60, FF, C8, 25, B4, 80, 4A, FD, 76, 03, F3, 28, D5, 0F, AF, CE, 73, 04, 85, F2, 18, ED, C7, C1, 04, 3D, F3, 6D, 88, E8, 29, F9, 22, C0, 6B, F6, 00, FF, C5, B8, 86, BD, D7, BB, 8D, 05, 6C, 7E, 66, 43, 81, C6, 15, E3, 00, 00, F2, 8D, 3D, 81, 43, 60, BD, 8B, FB, 69, CD, DA, 04, 58, 89, 0F, B7, C9, 2B, D6, 0F, AF, C5, 0F, B7, E8, 81, C2, D1, 0E, 00, 00, F3, 76, 03, 0F, B7, F5, 0F, B7, D1, FE, CD, 84, D0, 8B, D9, FE, C3, E8, 00, 00, 00, 00, 5F, 72, 0A, 69, EF, 23, A2, 38, 6F, 85, F3, FE, C9, 68, 51, E9, 21, 00...
 
[+]

Entropy:
2.3979

Code size:
20 KB (20,480 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
WindowMessenger

Command:
C:\recycler\{random}\winsysapp.exe


Remove commgr.exe - Powered by Reason Core Security