iwka.exe

Tradition0

SANDBOXIE L.T.D

The executable iwka.exe has been detected as malware by 5 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘{4A2FD19D-D61F-8ABF-61C0-AE91FC7AE28A}’. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server.
Publisher:
PC Tools  (signed by SANDBOXIE L.T.D)

Product:
Tradition0

Description:
Mostaganem

Version:
1.00

MD5:
f8de97c2ebe20dd7f485f842ca4dc020

SHA-1:
71e63a1e0a4e4547304adb0f51ee8e3d6b24a93a

SHA-256:
c15486963261b6435dc8430ad98e526d1dc149493ff6349e2bf7ccf52a53d901

Scanner detections:
5 / 68

Status:
Malware

Analysis date:
4/24/2024 2:30:58 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.PWS.Panda.8087
9.0.1.05190

ESET NOD32
Win32/Injector.CIGX trojan
6.3.12010.0

F-Secure
Variant.Symmi.64559
5.15.154

Kaspersky
Trojan-Spy.Win32.Zbot
15.0.2.529

Microsoft Security Essentials
VirTool:Win32/Injector.FQ
1.229.1461.0

File size:
257.7 KB (263,880 bytes)

Product version:
1.00

Original file name:
Flapcake2.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\tumi\iwka.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
12/6/2012 9:31:48 AM

Valid to:
3/8/2015 12:10:09 AM

Subject:
CN=SANDBOXIE L.T.D, O=SANDBOXIE L.T.D, L=Holon, S=Israel, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121D157F33DB2AB605536125B50FCF1D727

File PE Metadata
Compilation timestamp:
9/6/2015 3:27:14 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x132C

Entry point:
68, 48, DF, 42, 00, E8, EE, FF, FF, FF, 00, 00, 00, 00, 00, 00, 30, 00, 00, 00, 38, 00, 00, 00, 00, 00, 00, 00, 87, E4, AA, 73, A1, A4, E0, 47, 87, 88, C8, E9, AA, C8, C0, 1B, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 9E, 9C, 9F, C8, 86, 87, 4D, 61, 74, 74, 72, 61, 77, 00, 00, 00, 00, 00, FF, CC, 31, 00, 02, 34, BB, 6F, E4, B3, 55, 67, 4C, 8B, B3, 51, 89, C0, 3A, 2D, 00, 0A, 99, 71, 98, C8, B8, 60, 41, AF, 41, A5, 18, 78, 71, E6, E3, 3A, 4F, AD, 33, 99, 66, CF, 11, B7, 0C, 00, AA, 00, 60, D3, 93, 00, 00, 00...
 
[+]

Entropy:
7.4761

Developed / compiled with:
Microsoft Visual Basic v5.0/v6.0

Code size:
220 KB (225,280 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
{4A2FD19D-D61F-8ABF-61C0-AE91FC7AE28A}

Command:
C:\users\{user}\appdata\roaming\tumi\iwka.exe


Remove iwka.exe - Powered by Reason Core Security