enforcer.exe

This is a setup program which is used to install the application. The file has been seen being downloaded from dc763.4shared.com and multiple other hosts.
MD5:
9cd45b9cb05d931c1ec8802740a969ec

SHA-1:
6b9da0e4f8d3ddc7f7a67e4feaaea313778a8a19

SHA-256:
ea000ec043dbb3d9797b1e684670ecaf7e9a968df9c8b5e9edb5b8f688f90126

Scanner detections:
9 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
4/26/2024 3:19:00 AM UTC  (today)

Scan engine
Detection
Engine version

Bkav FE
W32.Clodaf2.Trojan
1.3.0.4677

IKARUS anti.virus
not-a-virus.Hacktool.GSM-Magic
t3scan.2.2.29

K7 AntiVirus
Trojan
13.175.10867

McAfee
HTool-GSMMagic
5600.7270

Norman
Suspicious_Gen2.SEUJS
11.20131226

Sophos
TNT! enFoRcEr
4.96

Trend Micro House Call
TROJ_SPNR.08JR11
7.2.360

Trend Micro
TROJ_SPNR.08JR11
10.465.26

VIPRE Antivirus
Trojan.Win32.Generic
25502

File size:
159 KB (162,816 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\progr.files\new tools\dreamup patched dm800 clon\dreamup patched\diffrent method\enforcer.exe

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
3072:e/YQTEbsxq1/Lu8FSNB4Eo2+g3LBK/Up2vOunIdweHNIPEJ7ZdPHFSY7Ll:eAQob1/nFSNTokLBK//OeaweHC27Z9nt

Entry address:
0x644E0

Entry point:
60, BE, 00, F0, 43, 00, 8D, BE, 00, 20, FC, FF, C7, 87, D4, 33, 04, 00, 4C, 01, 7A, F1, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, EF, 75, 09, 8B, 1E, 83, EE, FC, 11, DB, 73, E4, 31, C9, 83, E8, 03, 72, 0D, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 74, 89, C5, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
152 KB (155,648 bytes)

The file enforcer.exe has been discovered within the following program.

SigmaKey  by GsmServer
Publisher's description - “Universal multibrand and multifunctional MTK, Qualcomm, Broadcom and TI OMAP servicing solution, not tied to a specific model list. Revolutionary heuristic method that allows user to unlock a device even if it has an unknown or new firmware version.”
www.SigmaKey.com
About 5% of users remove it
 
Powered by Should I Remove It?

The file enforcer.exe has been seen being distributed by the following 2 URLs.

http://dc763.4shared.com/download/.../Copie_de_gsm-magic.exe

Scan enforcer.exe - Powered by Reason Core Security