f24b2dce-41e7-4f2f-9616-69f779c4b08d-11.exe

Apps Hat

Nero

The application f24b2dce-41e7-4f2f-9616-69f779c4b08d-11.exe has been detected as adware by 39 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Infected by an entry-point obscuring polymorphic file infector which will create a peer-to-peer botnet and receives URLs of additional files to download. While running, it connects to the Internet address ip-184-168-221-53.ip.secureserver.net on port 80 using the HTTP protocol.
Publisher:
Nero

Product:
Apps Hat

Description:
Apps Hat exe

Version:
1000.1000.1000.1000

MD5:
d3d23d6fe796bb198d2be7d68f31a1ad

SHA-1:
50a1980c041bea8d2b7f5e360d96d903c5ce8a9d

SHA-256:
c8eb8ca76cae323b394f8a49747d8a4c7e2682831c270071d7597884fdec31c6

Scanner detections:
39 / 68

Status:
Adware

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/26/2024 5:12:07 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
940

Agnitum Outpost
Win32.Sality.BK
7.1.1

AhnLab V3 Security
Win32/Kashu.E
2014.07.08

Avira AntiVirus
W32/Sality.AT
7.11.30.172

avast!
Win32:Kukacka
2014.9-140710

AVG
Win32/Sality
2015.0.3418

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14617

Bitdefender
Win32.Sality.3
1.0.20.955

Bkav FE
W32.Sality.PE
1.3.0.4959

Comodo Security
Virus.Win32.Sality.Gen
18804

Dr.Web
Win32.Sector.21
9.0.1.0191

Emsisoft Anti-Malware
Win32.Sality
8.14.07.10.01

ESET NOD32
Win32/Toolbar.CrossRider.AD potentially unwanted application
7.0.302.0

F-Prot
W32/Sality.gen2
v6.4.6.5.141

F-Secure
Win32.Sality.3
11.2014-10-07_5

G Data
Win32.Sality
14.7.24

IKARUS anti.virus
Virus.Win32.Sality
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.180.12643

Kaspersky
not-a-virus:AdWare.Win32.AdLoad
14.0.0.3585

Malwarebytes
PUP.Optional.AppsHat.A
v2014.06.17.09

McAfee
W32/Sality.gen.z
5600.7074

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Win32.Sality.3
15.0.0.573

NANO AntiVirus
Virus.Win32.Sality.beygb
0.28.0.60698

Norman
Sality.ZHB
11.20140710

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
Trj/Genetic.gen
14.06.17.09

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
7.14.14.00

Reason Heuristics
Threat.Win.Reputation.IMP
14.7.10.0

Rising Antivirus
PE:Win32.KUKU.kt!1591113
23.00.65.14708

Sophos
Mal/Sality-D
4.98

Total Defense
Win32/Sality.AA
37.0.11045

Trend Micro House Call
PE_SALITY.RL
7.2.191

Trend Micro
PE_SALITY.RL
10.465.10

Vba32 AntiVirus
Virus.Win32.Sality.bakb
3.12.26.3

VIPRE Antivirus
Threat.4789396
29708

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1850

File size:
1.8 MB (1,910,784 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Apps Hat.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\apps hat\f24b2dce-41e7-4f2f-9616-69f779c4b08d-11.exe

File PE Metadata
Compilation timestamp:
6/16/2014 6:04:09 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:N6fE22bfGPkjde3OsfLJgO2pS8dTEUzn+nPRx:Ng2yPmA3B9

Entry address:
0xE4D64

Entry point:
E8, 42, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, 75, 01, 01, 00, 3B, 30, 7C, 07, E8, 6C, 01, 01, 00, 8B, 30, E8, 5F, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 60, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, 40, 57, 54, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7A, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, 40, 57, 54, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, D9, ED...
 
[+]

Entropy:
6.8602

Code size:
1 MB (1,093,120 bytes)

Scheduled Task
Task name:
f24b2dce-41e7-4f2f-9616-69f779c4b08d-11

Trigger:
Logon (Runs on logon)

Action:
f24b2dce-41e7-4f2f-9616-69f779c4b08d-11.exe \jmosmu=deibpmb6u968q49o2gmdyra9qrsmz2out9gqzcfbyx


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-184-168-221-53.ip.secureserver.net  (184.168.221.53:80)

Remove f24b2dce-41e7-4f2f-9616-69f779c4b08d-11.exe - Powered by Reason Core Security