file6.exe

The executable file6.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Run’. While running, it connects to the Internet address ptr-85-0.impa.br on port 21.
MD5:
c9619f228583bb41cf9ea2bd57439132

SHA-1:
6e1896b2bcb0d538de8147058d23eed1075ad1aa

SHA-256:
8b1fa750593d1264db7286b2dd931eb802889e74cbbc31cade23333725fb8382

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/19/2024 9:25:01 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.CoinMiner
17.2.24.10

File size:
1.6 MB (1,654,780 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
2/6/2016 1:24:54 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.23

Entry address:
0x19C400

Entry point:
60, E8, E6, 19, 00, 00, 8B, 74, 24, 20, E8, 08, 00, 00, 00, 61, 68, A0, 12, 40, 00, C3, E9, 59, E8, 01, 16, 00, 00, 81, E6, 00, F0, FF, FF, 81, EE, 00, 10, 00, 00, 66, 81, 3E, 4D, 5A, 75, F3, 0F, B7, 7E, 3C, 03, FE, 8B, 6F, 78, 03, EE, 8B, 5D, 20, 03, DE, 33, C0, 8B, D6, 83, C3, 04, 40, 8B, 3B, 03, FA, E8, 0F, 00, 00, 00, 47, 65, 74, 50, 72, 6F, 63, 41, 64, 64, 72, 65, 73, 73, 00, 5E, 33, C9, B1, 0F, FC, F3, A6, 75, DA, 8B, F2, 8B, 5D, 24, 03, DE, 0F, B7, 0C, 43, 8B, 5D, 1C, 03, DE, 8B, 1C, 8B, 03, DE, 81...
 
[+]

Entropy:
7.8880

Packer / compiler:
ASPack v1.08.04

Code size:
78 KB (79,872 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Run

Command:
C:\file6.exe


The executing file has been seen to make the following network communications in live environments.

TCP (FTP):
Connects to walmart.com  (156.94.206.0:21)

TCP (FTP):
Connects to n003-000-000-000.static.ge.com  (3.47.194.0:21)

TCP (FTP):
Connects to hfc-181-138-127-0.une.net.co  (181.138.127.0:21)

TCP (FTP):
Connects to c122-107-226-0.mckinn3.vic.optusnet.com.au  (122.107.226.0:21)

TCP (FTP):
Connects to bfb40c00.virtua.com.br  (191.180.12.0:21)

TCP (FTP):
Connects to b0fc5a00.bb.sky.com  (176.252.90.0:21)

TCP (FTP):
Connects to 5ac11500.bb.sky.com  (90.193.21.0:21)

TCP (FTP):
Connects to 37-251-67-0.FTTH.ispfabriek.nl  (37.251.67.0:21)

TCP (FTP):
Connects to 210-1-146-0.catv.tees.ne.jp  (210.1.146.0:21)

TCP (FTP):
Connects to 188-173-199-0.next-gen.ro  (188.173.199.0:21)

TCP (FTP):
Connects to 177-199-57-0.user.vivozap.com.br  (177.199.57.0:21)

TCP (FTP):
Connects to unknown.telstraglobal.net  (134.159.81.0:21)

TCP (FTP):
Connects to softbank221059149000.bbtec.net  (221.59.149.0:21)

TCP (FTP):
Connects to softbank219018178000.bbtec.net  (219.18.178.0:21)

TCP (FTP):
Connects to softbank126012169000.bbtec.net  (126.12.169.0:21)

TCP (FTP):
Connects to softbank060150208000.bbtec.net  (60.150.208.0:21)

TCP (FTP):
Connects to ptr-85-0.impa.br  (147.65.85.0:21)

TCP (FTP):
Connects to mobile-107-244-235-0.mycingular.net  (107.244.235.0:21)

TCP (FTP):
Connects to mobile-107-228-43-0.mycingular.net  (107.228.43.0:21)

TCP (FTP):
Connects to host-105.206.8.0.etisalat.com.eg  (105.206.8.0:21)

Remove file6.exe - Powered by Reason Core Security