jlkhaufat.exe

Redduck Inc.

The executable jlkhaufat.exe has been detected as malware by 25 anti-virus scanners.
Publisher:
Redduck Inc.  (signed and verified)

MD5:
9ed891d5e8e8aa7f299460f5191eb509

SHA-1:
d631bd50fbce71ea7ea979544f1ae58b93486dd7

SHA-256:
f7d17c8fdeb8f29d9a2c617b9eab5a5766688fceb88a8502de6e4b689a35621b

Scanner detections:
25 / 68

Status:
Malware

Analysis date:
4/19/2024 8:42:56 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.3010940
210

AegisLab AV Signature
Troj.W32.Generic!c
2.1.4+

Agnitum Outpost
Trojan.Agent
7.1.1

Avira AntiVirus
TR/Kitkiot.196016
8.3.2.4

Arcabit
Trojan.Generic.D2DF17C
1.0.0.653

Bitdefender
Trojan.GenericKD.3010940
1.0.20.950

Comodo Security
UnclassifiedMalware
24112

Emsisoft Anti-Malware
Trojan.GenericKD.3010940
8.16.07.08.02

ESET NOD32
Win32/Kitkiot
10.12989

Fortinet FortiGate
W32/Generic.B!tr
7/8/2016

F-Secure
Trojan.GenericKD.3010940
11.2016-08-07_6

G Data
Trojan.GenericKD.3010940
16.7.25

IKARUS anti.virus
Trojan.Win32.Kitkiot
t3scan.2.0.6.0

K7 AntiVirus
Trojan
13.213.18666

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.-63

McAfee
RDN/Generic.dx
5600.6344

MicroWorld eScan
Trojan.GenericKD.3010940
17.0.0.570

NANO AntiVirus
Trojan.Win32.Kitkiot.dzwnhn
1.0.14.5798

nProtect
Trojan.GenericKD.3010940
16.02.05.01

Panda Antivirus
Generic Suspicious
16.07.08.02

Rising Antivirus
PE:Malware.Generic(Thunder)!1.A1C4 [F]
23.00.65.16706

Sophos
Mal/Generic-S
4.98

Trend Micro
TROJ_GEN.R00XC0EAT16
10.465.08

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
47030

File size:
191.4 KB (196,016 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\windows\jlkhaufat.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/24/2013 8:00:00 AM

Valid to:
9/25/2015 7:59:59 AM

Subject:
CN=Redduck Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Redduck Inc., L=Gangnam-gu, S=Seoul, C=KR

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0F66842B4F9C458B72136F0AE96924B7

File PE Metadata
Compilation timestamp:
1/23/2016 7:43:38 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:KTufdxTuB2XNTBfknnZAg0Fum5jYIqpfr:6ufdxSB2XNTBgZAOm5EFpz

Entry address:
0x2A9A

Entry point:
E8, 8A, 31, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 55, 8B, EC, 57, 56, 8B, 75, 0C, 8B, 4D, 10, 8B, 7D, 08, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, A0, 01, 00, 00, 81, F9, 80, 00, 00, 00, 72, 1C, 83, 3D, A0, 37, 5C, 00, 00, 74, 13, 57, 56, 83, E7, 0F, 83, E6, 0F, 3B, FE, 5E, 5F, 75, 05, E9, 87, 25, 00, 00, F7, C7, 03, 00, 00, 00, 75, 14, C1, E9, 02, 83, E2, 03, 83, F9, 08, 72, 29, F3, A5, FF, 24, 95, 20, 2C, 40, 00, 8B, C7, BA, 03, 00, 00, 00, 83, E9, 04...
 
[+]

Entropy:
6.1392

Code size:
62.5 KB (64,000 bytes)

Remove jlkhaufat.exe - Powered by Reason Core Security