dyna.blaster.(v2.5)(hudson.soft)(+t)-thecompany.exe

This is a setup program which is used to install the application. The file has been seen being downloaded from s10580.chomikuj.pl.
MD5:
514ef4433dc889f4c8ae44ef0b4c9b23

SHA-1:
547fb1edacde9624a693ccd1caf6461fc69903ac

SHA-256:
ac30b0bf4cb033f7f507653802085765c9c95e8aa2ed94c3976a6827fbe60331

Scanner detections:
7 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
6/27/2025 10:42:07 PM UTC  (today)

Scan engine
Detection
Engine version

Comodo Security
UnclassifiedMalware
16712

IKARUS anti.virus
Win32.SuspectCrc
t3scan.2.0.3.0

Norman
Suspicious_Gen4.DEJTM
11.20160319

Panda Antivirus
Suspicious file
16.03.19.11

Trend Micro House Call
TROJ_LOWZONE.BMC
7.2.79

Trend Micro
TROJ_LOWZONE.BMC
10.465.19

Vba32 AntiVirus
Adware.EzuLa
3.12.22.3

File size:
3.4 MB (3,568,932 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\dyna.blaster.(v2.5)(hudson.soft)(+t)-thecompany.exe

File PE Metadata
Compilation timestamp:
12/11/2011 7:34:17 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:1yFeHyHywltchgI3f0lnaQMgiEbxFyaeNRdrCSy/hxVh5QwMdqfIZl:1yXSwnogeKahE/+NRBCz/hjhSwMdqfs

Entry address:
0x403B

Entry point:
55, 8B, EC, 83, E4, F8, 81, EC, 1C, 09, 00, 00, 53, 56, 57, E8, 86, FB, FF, FF, 8B, 35, 0C, 90, 43, 00, FF, D6, 83, E0, 11, 3D, 11, 01, 00, 00, 0F, 84, 26, 04, 00, 00, FF, D6, 8B, 5C, 24, 28, A3, 0C, 50, 40, 00, E8, 55, FC, FF, FF, 8B, C8, 2B, 0D, 0C, 50, 40, 00, 6A, 03, 33, D2, 8B, C1, 5E, F7, F6, F7, C1, 00, 80, FF, FF, 0F, 85, 86, 02, 00, 00, 33, C0, 33, FF, 89, BC, 24, 24, 09, 00, 00, 66, 89, 84, 24, 10, 05, 00, 00, 89, BC, 24, 0C, 05, 00, 00, 66, 89, 84, 24, F8, 00, 00, 00, E8, 11, FC, FF, FF, 8B, C8...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
16 KB (16,384 bytes)

The file dyna.blaster.(v2.5)(hudson.soft)(+t)-thecompany.exe has been seen being distributed by the following URL.