fha239.tmp

Georgi Georgiev

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The file fha239.tmp by Georgi Georgiev has been detected as adware by 17 anti-malware scanners. This is a trojan Bot that uses IRC to communicate with a comand and control network. The Trojan drops other malicious software and opens a backdoor on the infected computer and will run automatically on each boot. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from www.golgool.info and multiple other hosts.
Publisher:
Georgi Georgiev  (signed and verified)

MD5:
dfaaaea0a31eed96a1554859bf9d58c4

SHA-1:
a7841091da0617c4badb7cff009bac9983e5407f

SHA-256:
19069c86a00c6200373b6f72938092054e0ebaae69c0fc2ab3eff579f4b1fe01

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Part of a backdoor IRC bot network.

Analysis date:
5/19/2024 4:06:33 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.113278
771

AhnLab V3 Security
Adware/Win32.Vonteera
2014.12.15

Avira AntiVirus
TR/Zusy.1587280
7.11.195.126

avast!
Win32:Adware-gen [Adw]
2014.9-141226

Bitdefender
Gen:Variant.Zusy.113278
1.0.20.1800

Comodo Security
ApplicUnwnt
20368

Emsisoft Anti-Malware
Gen:Variant.Zusy.113278
8.14.12.26.07

ESET NOD32
Win32/AdWare.Vonteera (variant)
8.10876

Fortinet FortiGate
Riskware/Vonteera
12/26/2014

F-Secure
Gen:Variant.Zusy.113278
11.2014-26-12_6

G Data
Gen:Variant.Zusy.113278
14.12.24

McAfee
Artemis!DFAAAEA0A31E
5600.6905

MicroWorld eScan
Gen:Variant.Zusy.113278
15.0.0.1080

Qihoo 360 Security
HEUR/QVM19.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.GeorgiGeorgiev
15.2.14.11

Trend Micro House Call
Suspicious_GEN.F47V1204
7.2.360

VIPRE Antivirus
Backdoor.Win32.Ircbot.gen
35722

File size:
1.5 MB (1,587,280 bytes)

Common path:
C:\users\{user}\appdata\local\temp\fha239.tmp

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
6/6/2014 3:00:00 AM

Valid to:
6/6/2016 2:59:59 AM

Subject:
CN=Georgi Georgiev, O=Georgi Georgiev, STREET="4 Petar Stoinov Str., Chelopechene", L=Sofia, S=Sofia, PostalCode=1617, C=BG

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
50E7161B35AEFC4CA801C951BEF0279A

File PE Metadata
Compilation timestamp:
12/4/2014 1:22:44 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:v3WZaUdrY3WkIhoFvPF5iGYiZ8wb11P2BWXkepFYmhPBcSC8NRjmjeWls8yGR2Km:PWZtkIKZriW1dF3JBckxvGRB7haHfrL

Entry address:
0x131B000

Entry point:
56, 50, 53, E8, 01, 00, 00, 00, CC, 58, 89, C3, 40, 2D, 00, 90, 0D, 00, 2D, E0, C5, 92, 05, 05, D7, C5, 92, 05, 80, 3B, CC, 75, 19, C6, 03, 00, BB, 00, 10, 00, 00, 68, 2F, 76, E1, 66, 68, B1, E8, 06, 59, 53, 50, E8, 0A, 00, 00, 00, 83, C0, 00, 89, 44, 24, 08, 5B, 58, C3, 55, 89, E5, 50, 53, 51, 56, 8B, 75, 08, 8B, 4D, 0C, C1, E9, 02, 8B, 45, 10, 8B, 5D, 14, 85, C9, 74, 0A, 31, 06, 01, 1E, 83, C6, 04, 49, EB, F2, 5E, 59, 5B, 58, C9, C2, 10, 00, 11, 7D, 00, 79, A8, 5A, 03, A1, C5, 1C, 3C, 9E, 71, 71, 00, C3...
 
[+]

Entropy:
7.9685  (probably packed)

Code size:
155 KB (158,720 bytes)

The file fha239.tmp has been seen being distributed by the following 3 URLs.

http://www.golgool.info/.../0ffd40.exe

Remove fha239.tmp - Powered by Reason Core Security