downbook.exe

The executable downbook.exe has been detected as malware by 24 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘DownBook’. While running, it connects to the Internet address 65-254-227-240.yourhostingaccount.com on port 80 using the HTTP protocol.
MD5:
8d2991392ab911e30dc44ec860f41441

SHA-1:
01562403003441e4dc314230f4a140a5454f030e

SHA-256:
5c84c7a19f0b332dd3671334a70c54f1260f3f5166e2bf6516ec4a027b345e88

Scanner detections:
24 / 68

Status:
Malware

Analysis date:
11/15/2018 10:32:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Rootkit.58045
17.02.02

Agnitum Outpost
Rootkit.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Badur
2014.03.01

Avira AntiVirus
Rkit/Agent.1016026
7.11.134.32

avast!
Win32:Rootkit-gen [Rtk]
2014.9-170202

AVG
Generic35
2018.0.2479

Bitdefender
Rootkit.58045
1.0.20.165

Dr.Web
Trojan.Siggen6.726
9.0.1.033

Emsisoft Anti-Malware
Rootkit.58045
8.17.02.02.02

ESET NOD32
Win32/GetBooks
11.9486

Fortinet FortiGate
W32/Badur.GJVG!tr
2/2/2017

F-Prot
W32/Banker.T.gen
v6.4.7.1.166

F-Secure
Rootkit.58045
11.2017-02-02_5

G Data
Rootkit.58045
17.2.24

IKARUS anti.virus
Trojan.Agent4
t3scan.2.2.29

K7 AntiVirus
Trojan
13.176.11302

Kaspersky
Trojan.Win32.Badur
14.0.0.-1108

McAfee
RDN/Generic PUP.x!bt3
5600.6135

MicroWorld eScan
Rootkit.58045
18.0.0.99

Panda Antivirus
Trj/Genetic.gen
17.02.02.02

Qihoo 360 Security
HEUR/Malware.QVM11.Gen
1.0.0.1015

Trend Micro House Call
TROJ_GEN.R021B01BR14
7.2.33

Vba32 AntiVirus
Trojan.Badur
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
26950

File size:
992.2 KB (1,016,012 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\downbook\downbook.exe

File PE Metadata
Compilation timestamp:
11/11/2013 1:11:00 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0x3193E0

Entry point:
60, BE, 00, 60, 62, 00, 8D, BE, 00, B0, DD, FF, C7, 87, F8, 69, 26, 00, 12, 6C, 70, BF, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Entropy:
7.9157

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
976 KB (999,424 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DownBook

Command:
"C:\users\{user}\appdata\local\downbook\downbook.exe" a517c4b3ba44bfa7d4d340cbedf74f9b 12


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to server-52-84-86-53.yul62.r.cloudfront.net  (52.84.86.53:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-yyz1.fbcdn.net  (31.13.80.12:443)

TCP (HTTP SSL):
Connects to server-52-84-86-218.yul62.r.cloudfront.net  (52.84.86.218:443)

TCP:
Connects to otlichnik1.planetahost.ru  (185.31.160.180:333)

TCP (HTTP):
Connects to ec2-54-152-133-101.compute-1.amazonaws.com  (54.152.133.101:80)

TCP (HTTP):
Connects to ec2-52-8-89-71.us-west-1.compute.amazonaws.com  (52.8.89.71:80)

TCP (HTTP):
Connects to 65-254-227-240.yourhostingaccount.com  (65.254.227.240:80)

Remove downbook.exe - Powered by Reason Core Security