ee9456f4f04c4cc45b9e8fcb804dc064.exe

The executable ee9456f4f04c4cc45b9e8fcb804dc064.exe has been detected as malware by 26 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘ee9456f4f04c4cc45b9e8fcb804dc064’. While running, it connects to the Internet address 58x158x177x102.ap58.ftth.ucom.ne.jp on port 1177.
MD5:
a6e355a6fd5ae548ff49493b23e7ee7c

SHA-1:
2158666bc73f51c1d0afe8c66b7068e97037e46d

SHA-256:
f2f6012050f1836dc36c5efec8cf920484bab8bd8caa893a450c2540674d14af

Scanner detections:
26 / 68

Status:
Malware

Analysis date:
4/20/2024 1:12:29 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Downloader.12
827

Agnitum Outpost
Trojan.Disfa
7.1.1

Avira AntiVirus
TR/ATRAPS.Gen
7.11.133.86

avast!
Win32:Malware-gen
2014.9-141031

Baidu Antivirus
Trojan.MSIL.Disfa
4.0.3.141031

Bitdefender
Gen:Variant.Downloader.12
1.0.20.1520

Dr.Web
Trojan.PackedENT.24715
9.0.1.0304

Emsisoft Anti-Malware
Gen:Variant.Downloader.12
8.14.10.31.06

ESET NOD32
MSIL/Bladabindi (variant)
8.9461

Fortinet FortiGate
W32/Disfa.DKDO!tr
10/31/2014

F-Secure
Gen:Variant.Downloader.12
11.2014-31-10_6

G Data
Gen:Variant.Downloader.12
14.10.24

Kaspersky
Trojan.MSIL.Disfa
14.0.0.3019

Malwarebytes
Trojan.Facebook
v2014.10.31.06

McAfee
Artemis!A6E355A6FD5A
5600.6961

Microsoft Security Essentials
Backdoor:MSIL/Bladabindi.B
1.10302

MicroWorld eScan
Gen:Variant.Downloader.12
15.0.0.912

nProtect
Trojan/W32.Fsysna.211456
14.02.23.01

Panda Antivirus
Trj/CI.A
14.10.31.06

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Rising Antivirus
PE:Trojan.Injector!6.50
23.00.65.141029

Sophos
Mal/Generic-S
4.97

SUPERAntiSpyware
Trojan.Agent/Gen-Bladabindi
10266

Trend Micro House Call
TROJ_GEN.R002C0DBJ14
7.2.304

Trend Micro
TROJ_GEN.R002C0DBJ14
10.465.31

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
26776

File size:
206.5 KB (211,456 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\microsoft\windows\start menu\programs\startup\ee9456f4f04c4cc45b9e8fcb804dc064.exe

File PE Metadata
Compilation timestamp:
12/29/2013 8:22:36 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:ORdEC2Oi8NXC797F8TBfFvj4bq57Ol3bayS+ImJ3lnXtaSUqgt:OQC2F8NXC796TB9vj48U3eyS+Bln9aSs

Entry address:
0xFFEF

Entry point:
E8, 12, 5B, 00, 00, E9, A4, FE, FF, FF, 6A, 0C, 68, 38, 11, 42, 00, E8, 67, 0D, 00, 00, 6A, 0E, E8, 68, 02, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, F4, 37, 42, 00, BA, F0, 37, 42, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A, 04, 50, E8, D9, E7, FF, FF, 59, FF, 76, 04, E8, D0, E7, FF, FF, 59, 83, 66, 04, 00, C7, 45, FC, FE, FF, FF, FF, E8, 0A, 00, 00, 00, E8, 56, 0D, 00, 00, C3, 8B, D0, EB, C5, 6A, 0E, E8, 33, 01, 00, 00, 59, C3, CC, CC, CC, CC, CC, CC...
 
[+]

Code size:
102 KB (104,448 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
ee9456f4f04c4cc45b9e8fcb804dc064

Command:
"C:\users\{user}\appdata\local\temp\dce.exe"..


The executing file has been seen to make the following network communication in live environments.

TCP:
Connects to 58x158x177x102.ap58.ftth.ucom.ne.jp  (58.158.177.102:1177)

Remove ee9456f4f04c4cc45b9e8fcb804dc064.exe - Powered by Reason Core Security