csccce.exe

The executable csccce.exe has been detected as malware by 34 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Csccce’. Accoriding to the detections, this has been classified as a kyelogger which is capable of recoring a user's keystrokes.
MD5:
1fb6ecde8d305507dc603be8566fc1bd

SHA-1:
edeeb628cb3f5ca40ddf37fc6870eefbc7d1da30

SHA-256:
6d49473413a02f6c158d931f80bab6cca1df992bc7e7358ccda2ab141143ad07

Scanner detections:
34 / 68

Status:
Malware

Explanation:
The software cotains keystroke monitoring/logging capablities which may or may not be installed without the user's knowledge.

Analysis date:
4/24/2024 12:57:01 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Barys.5646
675

Agnitum Outpost
TrojanSpy.KeyLogger
7.1.1

AhnLab V3 Security
Spyware/Win32.KeyLogger
2014.12.01

Avira AntiVirus
TR/Dropper.VB.Gen
7.11.189.158

avast!
Win32:VB-XNI [Trj]
2014.9-150331

AVG
Dropper.Generic6
2016.0.3153

Baidu Antivirus
Trojan.Win32.KeyLogger
4.0.3.15331

Bitdefender
Gen:Variant.Barys.5646
1.0.20.450

Comodo Security
UnclassifiedMalware
20248

Dr.Web
BackDoor.IRC.NgrBot.36
9.0.1.090

Emsisoft Anti-Malware
Gen:Variant.Barys.5646
8.15.03.31.09

ESET NOD32
Win32/Dorkbot
9.10805

Fortinet FortiGate
W32/Dorkbot.BAA!tr
3/31/2015

F-Secure
Gen:Variant.Barys.5646
11.2015-31-03_3

G Data
Gen:Variant.Barys.5646
15.3.24

IKARUS anti.virus
Worm.Win32.Dorkbot
t3scan.1.8.3.0

K7 AntiVirus
Trojan
13.186.14174

Kaspersky
Backdoor.Win32.Ruskill
14.0.0.2260

McAfee
Artemis!1FB6ECDE8D30
5600.6809

Microsoft Security Essentials
VirTool:Win32/VBInject
1.11202

MicroWorld eScan
Gen:Variant.Barys.5646
16.0.0.270

NANO AntiVirus
Trojan.Win32.KeyLogger.lbobu
0.28.6.63726

Norman
Suspicious_Gen2.QRCAA
11.20150331

Panda Antivirus
Generic Malware
15.03.31.09

Qihoo 360 Security
Malware.Radar01.Gen
1.0.0.1015

Quick Heal
Worm.Dorkbot.A
3.15.14.00

Sophos
Mal/VBCheMan-D
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Injector
9963

Trend Micro House Call
TSPY_KEYLOGGE.OI
7.2.90

Trend Micro
TSPY_KEYLOGGE.OI
10.465.31

Vba32 AntiVirus
TrojanSpy.KeyLogger
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
35296

ViRobot
Trojan.Win32.Keylogger.172544
2011.4.7.4223

Zillya! Antivirus
Trojan.Keylogger.Win32.10156
2.0.0.1996

File size:
168.5 KB (172,544 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\csccce.exe

File PE Metadata
Compilation timestamp:
8/14/2011 12:39:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:58u/05U4+4Pa7O34jhGN5z2iBE/md/g+ZVyV/ZiaDMT1IC1517yoG:5bvt634jhGzNsl+mV/wgnCF

Entry address:
0x3C220

Entry point:
60, BE, 00, 30, 41, 00, 8D, BE, 00, E0, FE, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 75, 20, 41, 01, DB, 75...
 
[+]

Entropy:
7.7635

Packer / compiler:
UPX 2.90LZMA

Code size:
168 KB (172,032 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Csccce

Command:
C:\users\{user}\appdata\roaming\csccce.exe


Remove csccce.exe - Powered by Reason Core Security