hfs.exe

Http File Server

rejetto

The executable hfs.exe has been detected as malware by 1 anti-virus scanner. The file has been seen being downloaded from www.ranchsendgift.com and multiple other hosts. While running, it connects to the Internet address ip-172-16-60-159.ec2.internal on port 7656.
Publisher:
rejetto

Product:
Http File Server

Version:
2.3.0.0

MD5:
2d46fb52e50f39de94ab9a1f6366b596

SHA-1:
77e55a3eacc3e1619657a91c362400fc9b856b21

SHA-256:
6a5c2f0bf37f532db0d20b0a2c8a3b9b3d0b8561c2aef15b473d9702e134a039

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/27/2024 2:57:17 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.6.16.5

File size:
2.4 MB (2,501,120 bytes)

Product version:
2.3

Copyright:
Copyright (C) 2002-2010 Massimo Melina (www.rejetto.com)

Original file name:
hfs.exe

File type:
Executable application (Win32 EXE)

Language:
Italian (Italy)

Common path:
C:\users\{user}\downloads\hfs.exe

File PE Metadata
Compilation timestamp:
6/19/1992 5:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:Nx8rfxXUmihx0frS9vADQUQ1D0aEDCSYNoTj8gJqvy4ddxCcu7SZA1:Nirfemihx4rS94kEfGS6Dox

Entry address:
0x172C70

Entry point:
55, 8B, EC, 83, C4, EC, 53, 33, C0, 89, 45, EC, B8, E4, FE, 56, 00, E8, 3E, 4C, E9, FF, 8B, 1D, B0, B5, 57, 00, 33, C0, 55, 68, C5, 2D, 57, 00, 64, FF, 30, 64, 89, 20, A1, 40, B2, 57, 00, 8B, 00, C7, 40, 14, 40, FD, 56, 00, 6A, 11, E8, 89, 58, E9, FF, 0F, BF, C0, F6, C4, 80, 75, 6C, A1, 40, B2, 57, 00, 8B, 00, BA, DC, 2D, 57, 00, E8, 1C, C1, F1, FF, 84, C0, 75, 30, A1, 40, B2, 57, 00, 8B, 00, 8B, 48, 0C, 8D, 45, EC, BA, F4, 2D, 57, 00, E8, 75, 2A, E9, FF, 8B, 45, EC, 33, C9, BA, 10, 00, 00, 00, E8, E2, 84...
 
[+]

Entropy:
6.7127

Developed / compiled with:
Microsoft Visual C++

Code size:
1.4 MB (1,512,448 bytes)

Windows Firewall Allowed Program
Name:
hfs.exe


The file hfs.exe has been seen being distributed by the following 6 URLs.

http://www.ranchsendgift.com/PD0qTQ5WtuiaCZ0 zMVj993lJDK SN _7Fdvq453gtirN0UYpijSozpWC6Nv3u0JSU5as1n4TsLbprHLJvcNaffeU7kc20HJMn_rwJBGlBZ9DaeviB cusKxb1Fed8oCBJOSbNMiMuE1YgH2aUl3oxGR4TKY 4VOkGZ8sLZJG6VdHHLLqcwD0bR4LcxnFdwtkikDXbY5KgDR__MnVYhDp b6609uvQ==-GyoAAARil PWuBeXJKLiHzbgxAPzgAIbTM4NRK3xHZK7lof5lzwtF E74QM=

http://turekuba.cz/.../hfs.exe

http://hfs.kilobyte.cz/.../hfs.exe

http://files.snapfiles.com/.../hfs.exe

The executing file has been seen to make the following network communications in live environments.

TCP:
Connects to ip-172-16-60-159.ec2.internal  (172.16.60.159:7656)

TCP:
Connects to ip-172-16-62-248.ec2.internal  (172.16.62.248:7789)

TCP:
Connects to ip-172-16-60-148.ec2.internal  (172.16.60.148:2837)

TCP:
Connects to ip-172-16-61-115.ec2.internal  (172.16.61.115:50388)

TCP:
Connects to ip-172-16-60-139.ec2.internal  (172.16.60.139:59220)

Remove hfs.exe - Powered by Reason Core Security