dcc_e2.exe

BernyR

The executable dcc_e2.exe, “Dreambox Control Center” has been detected as malware by 35 anti-virus scanners. Infected by an entry-point obscuring polymorphic file infector which will create a peer-to-peer botnet and receives URLs of additional files to download.
Publisher:
BernyR

Description:
Dreambox Control Center

Version:
2.5.1.1

MD5:
fb6e2d21f85b3653ad6f9821c90532a0

SHA-1:
a52677f337e2308a0c3b19b9b3ee570a033aaca9

SHA-256:
d0bf7015f3313a0b9ad9aacf070a909b06ed73a977b0a0d1296f0b53ce0042ea

Scanner detections:
35 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/24/2024 5:40:34 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
885

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
Win32/Kashu.E
2014.09.03

Avira AntiVirus
W32/Sality.AT
7.11.30.172

avast!
Win32:Sality
140813-1

AVG
Win32/Virut
2014.0.4015

Bitdefender
Win32.Sality.3
1.0.20.1225

Bkav FE
W32.Sality.PE
1.3.0.4959

Comodo Security
Virus.Win32.Sality.Gen
19401

Dr.Web
Win32.Sector.22
9.0.1.05190

Emsisoft Anti-Malware
Win32.Sality
8.14.09.02.08

ESET NOD32
Win32/Sality.NBA virus
7.0.302.0

F-Prot
W32/Sality.gen2
4.6.5.141

F-Secure
Win32.Sality.3
11.2014-02-09_3

G Data
Win32.Sality
14.9.24

IKARUS anti.virus
Virus.Win32.Sality
t3scan.1.7.5.0

K7 AntiVirus
Virus
13.183.13247

Kaspersky
Virus.Win32.Sality
15.0.0.494

McAfee
W32/Sality.gen.z
5600.7019

Microsoft Security Essentials
Threat.Undefined
1.183.1287.0

MicroWorld eScan
Win32.Sality.3
15.0.0.735

NANO AntiVirus
Virus.Win32.Sality.beygb
0.28.2.61942

Norman
Sality.ZHB
11.20140902

nProtect
Virus/W32.Sality.D
14.09.02.01

Panda Antivirus
W32/Sality.AA
14.09.02.08

Quick Heal
W32.Sality.U
9.14.14.00

Rising Antivirus
PE:Win32.KUKU.kt!1591113
23.00.65.14831

Sophos
Mal/Sality-D
4.98

Total Defense
Win32/Sality.AA
37.0.11158

Trend Micro House Call
PE_VIRUX.R
7.2.245

Trend Micro
PE_VIRUX.R
10.465.02

Vba32 AntiVirus
Virus.Win32.Sality.bakc
3.12.26.3

VIPRE Antivirus
Threat.4721115
32210

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1908

File size:
6.2 MB (6,490,624 bytes)

Product version:
1.0.0.0

Copyright:
BernyR

Original file name:
DCC.exe

File type:
Executable application (Win32 EXE)

Language:
German (Germany)

Common path:
C:\documents and settings\bakoum\bureau\drembox\dcc_e2\dcc_e2.exe

File PE Metadata
Compilation timestamp:
12/29/2006 7:38:58 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
5.0

CTPH (ssdeep):
98304:HvHvRqFjI0rR50spb2HLH0jv6Q980W0ujlSqews/2:nR4MIR5WLOj9JWvSIs/2

Entry address:
0x6328C1

Entry point:
85, F3, 68, 79, D9, 5B, 00, 55, 31, F3, FE, C1, 8D, 2D, C7, F5, 1D, 74, 55, 69, FF, 2F, 14, BC, 67, 73, 03, F6, C6, AA, 8D, 05, BE, B6, 68, C2, E8, 1A, 00, 00, 00, 69, C3, E8, CB, 79, 43, 85, EE, 1B, D2, 8A, F3, 8D, 15, 4A, 82, 1D, AB, 69, C9, 36, FE, DF, 72, 3B, DA, 20, D4, FF, C2, 85, DF, 69, DB, FF, 48, 94, 4B, EB, 04, 8B, EE, 10, C6, 8D, 36, F6, C4, 14, 59, 87, EA, 10, D4, 87, D8, 8B, D6, 86, FF, BD, 71, 82, 49, 81, C6, C6, 19, FF, CB, 86, FC, 81, C1, 79, 1C, 00, 00, 0F, BF, F1, 34, 7A, 80, C2, AF, 81...
 
[+]

Code size:
3.9 MB (4,079,616 bytes)

Windows Firewall Allowed Program
Name:
C:\Documents and Settings\BAKOUM\Bureau\Drembox\Dcc_e2\DCC_E2.exe


Remove dcc_e2.exe - Powered by Reason Core Security