dailybee.exe

DailyWiki

The executable dailybee.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyBee’.
Publisher:
DailyWiki  (signed and verified)

MD5:
e089e6ed43ef7eab094a1ad95463e1c5

SHA-1:
28ca445d2d332fc3792438dbd9624b4623996df2

SHA-256:
b5e585db32423b5e108e2574873260d8528c21cdcc2032a7b4385a2e9aedfdd5

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
9/25/2018 2:27:13 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.1.2.13

File size:
45.6 MB (47,826,088 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailybee\dailybee.exe

Digital Signature
Signed by:

Authority:
DailyWiki

Valid from:
9/19/2015 5:16:51 PM

Valid to:
9/16/2025 5:16:51 PM

Subject:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Issuer:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Serial number:
00DE81C7E6A224F568

File PE Metadata
Compilation timestamp:
2/20/2016 10:43:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x1C9A031

Entry point:
E8, 5A, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, A8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, A8, EC, 02, 5D, C3, E8, 09, 21, 00, 00, 85, C0, 74, 08, 6A, 16, E8, CC, 21, 00, 00, 59, F6, 05, 20, A8, EC, 02, 02, 74, 21, 6A, 17, E8, D9, 20, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A9, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 16, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Entropy:
6.8805

Code size:
34.9 MB (36,634,112 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyBee

Command:
C:\users\{user}\appdata\roaming\dailybee\dailybee.exe su


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-23-23-117-76.compute-1.amazonaws.com  (23.23.117.76:80)

TCP (HTTP):
Connects to w04.ttms.eu  (46.105.156.76:80)

TCP (HTTP):
Connects to c4.3e.559e.ip4.static.sl-reverse.com  (158.85.62.196:80)

TCP (HTTP):
Connects to 131.subnet180-250-66.speedy.telkom.net.id  (180.250.66.131:80)

TCP (HTTP SSL):
Connects to server-54-192-150-75.sin2.r.cloudfront.net  (54.192.150.75:443)

TCP (HTTP SSL):
Connects to server-54-192-150-32.sin2.r.cloudfront.net  (54.192.150.32:443)

TCP (HTTP):
Connects to server-54-192-150-146.sin2.r.cloudfront.net  (54.192.150.146:80)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.sg3.yahoo.com  (106.10.162.43:443)

TCP (HTTP SSL):
Connects to i.connect.into.the.devilbox.info  (66.90.98.37:443)

TCP (HTTP):
Connects to ec2-54-243-113-132.compute-1.amazonaws.com  (54.243.113.132:80)

TCP (HTTP):
Connects to ec2-52-71-87-48.compute-1.amazonaws.com  (52.71.87.48:80)

TCP (HTTP SSL):
Connects to ec2-52-48-217-100.eu-west-1.compute.amazonaws.com  (52.48.217.100:443)

TCP (HTTP):
Connects to ec2-52-45-84-141.compute-1.amazonaws.com  (52.45.84.141:80)

TCP (HTTP SSL):
Connects to a104-93-203-89.deploy.static.akamaitechnologies.com  (104.93.203.89:443)

TCP (HTTP):
Connects to 45.242.178.107.bc.googleusercontent.com  (107.178.242.45:80)

TCP (HTTP):
Connects to ec2-54-183-82-138.us-west-1.compute.amazonaws.com  (54.183.82.138:80)

TCP (HTTP):
Connects to ec2-52-9-59-204.us-west-1.compute.amazonaws.com  (52.9.59.204:80)

TCP (HTTP):

TCP (HTTP):
Connects to ec2-34-199-132-228.compute-1.amazonaws.com  (34.199.132.228:80)

TCP (HTTP):
Connects to cd.3e.559e.ip4.static.sl-reverse.com  (158.85.62.205:80)

Remove dailybee.exe - Powered by Reason Core Security