droid4x_0.8.7-beta.exe

Fotololed

Sivensys SRL

The executable droid4x_0.8.7-beta.exe, “Fotololed Setup ” has been detected as malware by 1 anti-virus scanner. The program is a setup application that uses the Inno Setup installer. The file has been seen being downloaded from www.funcentralnew.com and multiple other hosts. While running, it connects to the Internet address server-52-85-63-195.lhr50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Sivensys SRL  (signed and verified)

Product:
Fotololed

Description:
Fotololed Setup

MD5:
ed3dd08bf7e5d9a5b4504c4eac3d8482

SHA-1:
79568c24f299b0801dfed22d45364e6396d82917

SHA-256:
e0ce15d1e7f7ecebf5f6394b5cc6d06121742c68949fff4ac06fa56166a86d95

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/19/2024 7:51:36 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.8.15

File size:
1.2 MB (1,280,368 bytes)

Product version:
5.5

Copyright:
Internet

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\droid4x_0.8.7-beta.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
10/20/2016 1:04:57 PM

Valid to:
10/21/2017 1:04:57 PM

Subject:
CN=Sivensys SRL, O=Sivensys SRL, L=IASI, C=RO

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE

Serial number:
0D38E905F0B0BA5733036DFB

File PE Metadata
Compilation timestamp:
6/20/1992 3:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0xAA98

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 2E, 86, FF, FF, E8, 35, 98, FF, FF, E8, 9C, 9B, FF, FF, E8, B7, 9F, FF, FF, E8, 56, BF, FF, FF, E8, ED, E8, FF, FF, E8, 54, EA, FF, FF, 33, C0, 55, 68, 69, B1, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 32, B1, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, D0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, C2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, 24, 93, FF, FF, 8D, 55, F0, 33, C0, E8, 66, C5, FF, FF, 8B, 55...
 
[+]

Entropy:
7.9856

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
40.5 KB (41,472 bytes)

The file droid4x_0.8.7-beta.exe has been seen being distributed by the following 2 URLs.

http://www.funcentralnew.com/7zqdmDH_gs1v3Wwz66QswlFj37 mMRsCTeZunn_09lQykZao34id1Xb0 3htozL8FFDz2qNPYt7skHK Oyg_8T5fbPCQJx_AfQoSQaHAhX3pZdejLkg412nut7gcJ9EDUif3PXVAFWMEUEIXsfC798klt_DN8JRBcSMntCpy6cOAxYu6KT5mBT9BJjvpF2dB_jreA0 I wZ QXmyy3UKoLGNbE_nD1enmaXxt26UdcuLSR4Up14SpiZ5bz1AyUhlhiFD PBX2oEBAx_gFJDEj5Drt5vMRRuRnpmraI1L UkXX5Zu CtrGXnZ 4WY8ZG4g50qrEw2X24BnWL3 jMs M2cV8U6qQfi6_icLgB5 7_x4Ahw9es7Skw66c4fr81tb7DSVW980lG8cnpK3nPoBq46mQUMwJbdBMUExeCvkXROBx8ycPyUfOcpMz4RFm0o4LkvR3VUXHQR dfPPJuyikN3iOitg==-GxQAAKRdxtretCCEFCKK5DqwG4Nvu_EA-e

http://www.funcentralnew.com/wFjk1WajOmBJ2gaRu7VgJ7XnkwUkMGHsa9RpQcMqxVKzo_GoTT__PEOnC3UlFe0y7Aau9qpEmBQMQNmZRF7jhpTOVgPNXpc0_vqKAdUbC8_VzhK4p0lKvQzxFULhvXE1iM2T6JLyqKDbj1vBUxqZw4WXhCJ4mp6Gb1Ob5FXt1kd5SGTo8rKyfP760EDeiYBg8QUOwYxbEwWwogeqJdQCgjJUDYNnS3SRpZ47nAFEW09db5QMtuDZbmAQf8FpW8Ua7H0QITSiXU0mc_bEgoUpadyYN7DgqMsoVI5ElEv0bP1Xx v2vpDH3omgy_jjGTbuYpjkKuOeipVgFjSK0I5ozDLEmmXjUQ7881Vi4Wdm6Lt6eXTGTkebPW7LXac_BpMQZdV n36pBN13crqoAdK77yCyc3uc0quNVmaFua gjrpuavdwNKWbMjQKVdB4w_obMZhJuPUKp3_NPpwS3fyB_nsYsBYMRQ==-GxQAAKRdxtretCCEFCKK5DqwG4Nvu_EA-e

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-154-109-8.eu-west-1.compute.amazonaws.com  (54.154.109.8:80)

TCP (HTTP):
Connects to server-54-192-159-232.sin3.r.cloudfront.net  (54.192.159.232:80)

TCP (HTTP SSL):
Connects to generic.external.zlb.scl3.mozilla.com  (63.245.213.12:443)

TCP (HTTP):
Connects to ec2-54-154-229-88.eu-west-1.compute.amazonaws.com  (54.154.229.88:80)

TCP (HTTP):
Connects to 50.115.122.45.static.westdc.net  (50.115.122.45:80)

TCP (HTTP):
Connects to server-52-85-94-176.jfk5.r.cloudfront.net  (52.85.94.176:80)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (54.231.98.192:80)

TCP (HTTP):
Connects to hosted-by.leaseweb.com  (199.58.87.155:80)

TCP (HTTP):
Connects to ec2-54-186-47-57.us-west-2.compute.amazonaws.com  (54.186.47.57:80)

TCP (HTTP):
Connects to ec2-54-186-199-44.us-west-2.compute.amazonaws.com  (54.186.199.44:80)

TCP (HTTP):
Connects to ec2-52-214-247-42.eu-west-1.compute.amazonaws.com  (52.214.247.42:80)

TCP (HTTP):
Connects to ec2-34-198-66-66.compute-1.amazonaws.com  (34.198.66.66:80)

TCP (HTTP):
Connects to server-54-192-25-191.mxp4.r.cloudfront.net  (54.192.25.191:80)

TCP (HTTP):
Connects to server-52-85-63-195.lhr50.r.cloudfront.net  (52.85.63.195:80)

TCP (HTTP):
Connects to net-inst-ash.opera.com  (37.228.108.239:80)

TCP (HTTP):
Connects to ec2-54-186-117-168.us-west-2.compute.amazonaws.com  (54.186.117.168:80)

TCP (HTTP):
Connects to ec2-54-154-190-87.eu-west-1.compute.amazonaws.com  (54.154.190.87:80)

TCP (HTTP):
Connects to ec2-52-49-170-39.eu-west-1.compute.amazonaws.com  (52.49.170.39:80)

TCP (HTTP):
Connects to ec2-52-2-72-151.compute-1.amazonaws.com  (52.2.72.151:80)

TCP (HTTP SSL):
Connects to a88-221-152-242.deploy.akamaitechnologies.com  (88.221.152.242:443)

Remove droid4x_0.8.7-beta.exe - Powered by Reason Core Security