d.exe

RemoteZilla

Ordinatec

The executable d.exe, “RemoteZilla Customer Module” has been detected as malware by 5 anti-virus scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from ordinatec.ca.
Publisher:
Ordinatec

Product:
RemoteZilla

Description:
RemoteZilla Customer Module

Version:
2.1.1.0

MD5:
81e9695ccdfc419657203012a0c1d002

SHA-1:
f75f79cc962773ef713bfb9512aa338d5d1f9055

SHA-256:
4cff2719260dfc9b77b2fc2f7af5ae9ea46333ec7910e7cc2fabf0f2d3dc3d28

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
5/4/2024 12:43:54 PM UTC  (today)

Scan engine
Detection
Engine version

Norman
Malware.ZCKW
11.20140826

Quick Heal
Trojan.Agent.nq
8.14.12.00

Trend Micro House Call
TROJ_GEN.R0CBC0OLF13
7.2.238

Trend Micro
TROJ_GEN.R0CBC0OLF13
10.465.26

VIPRE Antivirus
Trojan.Win32.Generic
24416

File size:
560.4 KB (573,843 bytes)

Copyright:
Copyright © 2001-2009 Advantig Corporation. All rights reserved.

Trademarks:
RemoteZilla

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\d.exe

File PE Metadata
Compilation timestamp:
7/29/2009 9:16:20 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:1GI+o+olCETPfdYnR2alFok5EuGMgiypTM7:Eu+ol7GnQalKk5pGMgiUM

Entry address:
0x40B8

Entry point:
83, EC, 0C, 53, 55, 56, 57, C7, 44, 24, 10, E0, 91, 40, 00, 33, DB, C6, 44, 24, 14, 20, FF, 15, 2C, 70, 40, 00, 53, FF, 15, 90, 72, 40, 00, BE, 00, A4, 42, 00, BF, 00, 04, 00, 00, 56, 57, A3, A8, 3F, 42, 00, FF, 15, D8, 70, 40, 00, E8, 8D, FF, FF, FF, 8B, 2D, A4, 70, 40, 00, 85, C0, 75, 21, 68, FB, 03, 00, 00, 56, FF, 15, D4, 70, 40, 00, 68, A4, 92, 40, 00, 56, FF, D5, E8, 6A, FF, FF, FF, 85, C0, 0F, 84, 55, 01, 00, 00, BE, 20, 37, 42, 00, 56, FF, 15, 80, 70, 40, 00, 68, 94, 92, 40, 00, 56, E8, 28, 29, 00...
 
[+]

Code size:
23.5 KB (24,064 bytes)

The file d.exe has been seen being distributed by the following URL.

Remove d.exe - Powered by Reason Core Security