droid4x_0.8.7-beta.exe

Muf

Sivensys SRL

The executable droid4x_0.8.7-beta.exe, “Muf Setup ” has been detected as malware by 1 anti-virus scanner. The program is a setup application that uses the Inno Setup installer. The file has been seen being downloaded from www.funcentralnew.com. While running, it connects to the Internet address net-inst-ash.opera.com on port 80 using the HTTP protocol.
Publisher:
Sivensys SRL  (signed and verified)

Product:
Muf

Description:
Muf Setup

Version:
3.1.3.0

MD5:
074f149014b5e143feafe97eb7a1e815

SHA-1:
abaa1fb924e03c18e5d5b974c7c12ccf1b6cb695

SHA-256:
1a677fb25bfabafdcb2594f27c0c25656a22fb69b9edd7ea6082c67672534f49

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/23/2024 8:52:36 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.2.23.0

File size:
1.2 MB (1,299,912 bytes)

Product version:
1.0.9

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\ucbrowser\droid4x_0.8.7-beta.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
10/20/2016 10:04:57 AM

Valid to:
10/21/2017 10:04:57 AM

Subject:
CN=Sivensys SRL, O=Sivensys SRL, L=IASI, C=RO

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G3, O=GlobalSign nv-sa, C=BE

Serial number:
0D38E905F0B0BA5733036DFB

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

Entry address:
0xAA98

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 2E, 86, FF, FF, E8, 35, 98, FF, FF, E8, 9C, 9B, FF, FF, E8, B7, 9F, FF, FF, E8, 56, BF, FF, FF, E8, ED, E8, FF, FF, E8, 54, EA, FF, FF, 33, C0, 55, 68, 69, B1, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 32, B1, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, D0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, C2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, 24, 93, FF, FF, 8D, 55, F0, 33, C0, E8, 66, C5, FF, FF, 8B, 55...
 
[+]

Entropy:
7.9855

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
40.5 KB (41,472 bytes)

The file droid4x_0.8.7-beta.exe has been seen being distributed by the following URL.

http://www.funcentralnew.com/PnvN8fhm_LAw 5dl5EeTGQWfug5cpG4B_pA4JZ08 0E2qkPMWJ3T_IKQNUP7nigS0JjhHMHE4LvOqFIgG762IOOY8xx1PhYLTkdjcD4ulq8UoBm32IdNlEajU4aQVUBeE96K9efs4qCgwvfpSpyqWCWQfnbd7aGOf5KHAhKEciPnhmvT7jBXIQ sxg5bEQW96iu616qcxp1quSnj0NUuGwhQ4hDJXw==-GxQAAKRdxtretCCEFCKK5DqwG4Nvu_EA

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-214-247-42.eu-west-1.compute.amazonaws.com  (52.214.247.42:80)

TCP (HTTP SSL):
Connects to generic.external.zlb.scl3.mozilla.com  (63.245.213.12:443)

TCP (HTTP):
Connects to ec2-54-207-84-20.sa-east-1.compute.amazonaws.com  (54.207.84.20:80)

TCP (HTTP):
Connects to ec2-176-34-130-130.eu-west-1.compute.amazonaws.com  (176.34.130.130:80)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (52.216.1.48:80)

TCP (HTTP):
Connects to ec2-52-208-40-227.eu-west-1.compute.amazonaws.com  (52.208.40.227:80)

TCP (HTTP):
Connects to server-52-85-167-36.gig50.r.cloudfront.net  (52.85.167.36:80)

TCP (HTTP):
Connects to server-52-85-167-101.gig50.r.cloudfront.net  (52.85.167.101:80)

TCP (HTTP):
Connects to hosted-by.leaseweb.com  (199.58.87.151:80)

TCP (HTTP):
Connects to ec2-54-233-143-209.sa-east-1.compute.amazonaws.com  (54.233.143.209:80)

TCP (HTTP):
Connects to ec2-52-67-76-234.sa-east-1.compute.amazonaws.com  (52.67.76.234:80)

TCP (HTTP):
Connects to 92b91b35.rdns.100tb.com  (146.185.27.53:80)

TCP (HTTP):
Connects to net-inst-ash.opera.com  (37.228.108.239:80)

TCP (HTTP):
Connects to ec2-52-39-235-174.us-west-2.compute.amazonaws.com  (52.39.235.174:80)

Remove droid4x_0.8.7-beta.exe - Powered by Reason Core Security