iobitdownloader_monster.exe

Vladislav Belousov

The executable iobitdownloader_monster.exe has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address static.yandex.net on port 443.
Publisher:
Strage people  (signed by Vladislav Belousov)

Product:
Strage people

Version:
1.14.0.0

MD5:
8c6cff5ae07b0fe22357d1d4bbb51fa8

SHA-1:
bca0ac64150f4668a3f2e8d850be59501bbec1ed

SHA-256:
b3723a968441453084a032036f81b3a6915f9e3004be38ce5f4ea3ec9596168f

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/25/2024 9:43:34 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.3.7.22

File size:
131.6 KB (134,760 bytes)

Product version:
1.14.0.0

Original file name:
downloader.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\iobitdownloader_monster.exe

Digital Signature
Authority:
StartCom Ltd.

Valid from:
10/31/2015 5:30:20 AM

Valid to:
10/31/2017 6:27:17 PM

Subject:
E=belousov-vladi@mail.ru, CN=Vladislav Belousov, L=Moscow, S=Moscow City, C=RU

Issuer:
CN=StartCom Class 2 Primary Intermediate Object CA, OU=Secure Digital Certificate Signing, O=StartCom Ltd., C=IL

Serial number:
13701625AB3213

File PE Metadata
Compilation timestamp:
3/7/2017 9:38:06 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

Entry address:
0x1A5A6

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 03, 00, 03, 00, 00, 00, 28, 00, 00, 80, 0E, 00, 00, 00, 58, 69, 00, 80, 10, 00, 00, 00, 0A, 6A...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
97.5 KB (99,840 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 62-140-236-163.fiord.ru  (62.140.236.163:80)

TCP (HTTP):
Connects to moscow.cdnmail.ru  (217.69.139.110:80)

TCP (HTTP):
Connects to a92-123-140-35.deploy.akamaitechnologies.com  (92.123.140.35:80)

TCP (HTTP):
Connects to anvir.com  (185.22.234.46:80)

TCP (HTTP SSL):
Connects to static.yandex.net  (178.154.131.215:443)

TCP (HTTP):
Connects to a95-101-72-217.deploy.akamaitechnologies.com  (95.101.72.217:80)

TCP (HTTP):
Connects to fft-srv-106.itsinternet.net  (213.133.184.106:80)

TCP (HTTP):
Connects to a88-221-133-33.deploy.akamaitechnologies.com  (88.221.133.33:80)

TCP (HTTP):
Connects to a2-16-155-26.deploy.akamaitechnologies.com  (2.16.155.26:80)

Remove iobitdownloader_monster.exe - Powered by Reason Core Security