lolclient.exe

The executable lolclient.exe has been detected as malware by 39 anti-virus scanners. According to the AV engines that detect this, it is a detection for a file infected by members of the Win32/Ramnit malware family and may drop and load other malware.
MD5:
285e80939cf31d127aaf9ea3ee91ec16

SHA-1:
3019af1e319def6c8c17ec3c034ab0007a3c6ebe

SHA-256:
cde3d19468e3735fce24508a83f2436021a5ec1b7fe6d3edd63c7fd9e0f942d3

Scanner detections:
39 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/25/2024 1:32:33 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Ramnit
256

Agnitum Outpost
Win32.Ramnit.Gen.3
7.1.1

AhnLab V3 Security
Win32/Ramnit.B
2015.09.07

Avira AntiVirus
W32/Ramnit.A
8.3.2.2

Arcabit
Win32.Ramnit
1.0.0.425

avast!
Win32:RmnDrp
2014.9-160524

AVG
Win32/Ramnit.A
2017.0.2734

Baidu Antivirus
Virus.Win32.Nimnul.$a
4.0.3.16524

Bitdefender
Win32.Ramnit
1.0.20.725

Bkav FE
W32.HfsAutoB
1.3.0.7133

Clam AntiVirus
W32.Ramnit-1
0.98/21511

Comodo Security
Virus.Win32.Ramnit.A
23189

Dr.Web
Win32.Rmnet
9.0.1.0145

Emsisoft Anti-Malware
Win32.Ramnit
8.16.05.24.09

ESET NOD32
Win32/Ramnit
10.12211

Fortinet FortiGate
W32/Ramnit.C
5/24/2016

F-Prot
W32/Ramnit.B
v6.4.7.1.166

F-Secure
Win32.Ramnit
11.2016-24-05_3

G Data
Win32.Ramnit
16.5.25

IKARUS anti.virus
Virus.Win32.Ramnit
t3scan.1.9.5.0

K7 AntiVirus
Virus
13.2017125

Kaspersky
Virus.Win32.Nimnul
14.0.0.163

McAfee
W32/Ramnit.a
5600.6390

Microsoft Security Essentials
Virus:Win32/Ramnit.A
1.1.12002.0

MicroWorld eScan
Win32.Ramnit
17.0.0.435

NANO AntiVirus
Virus.Win32.Nimnul.bpchjo
0.30.24.3283

nProtect
Win32.Ramnit
15.09.04.01

Panda Antivirus
W32/Cosmu.gen
16.05.24.09

Qihoo 360 Security
HEUR/Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Ramnit.A
5.16.14.00

Rising Antivirus
PE:Virus.Ramnit!1.9AA5[F1]
23.00.65.16522

Sophos
W32/Patched-I
4.98

Total Defense
Win32/Ramnit.A
37.1.62.1

Trend Micro House Call
PE_RAMNIT.H
7.2.145

Trend Micro
PE_RAMNIT.H
10.465.24

Vba32 AntiVirus
Virus.Win32.Nimnul.a
3.12.26.4

VIPRE Antivirus
Virus.Win32.Ramnit.a
43520

ViRobot
Win32.Ramnit.E[h]
2014.3.20.0

Zillya! Antivirus
Virus.Nimnul.Win32.1
2.0.0.2388

File size:
129.5 KB (132,608 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
3/30/2013 11:02:40 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:rBeYPEuHM4zy5bxAxCzqyhP+KBOKBA+Q52x9CXOGbN6kVUNST3eR5LBHOAaF0:zMsy5bxAxW9XOKB5LCXVL532VOT0

Entry address:
0x16000

Entry point:
60, E8, 00, 00, 00, 00, 5D, 8B, C5, 81, ED, 32, 6F, 01, 20, 2B, 85, 50, 72, 01, 20, 89, 85, 4C, 72, 01, 20, B0, 00, 86, 85, 9E, 74, 01, 20, 3C, 01, 0F, 85, DE, 02, 00, 00, 8B, 85, 4C, 72, 01, 20, 2B, 85, 58, 72, 01, 20, 8B, 00, 89, 85, EA, 73, 01, 20, 8B, 85, 4C, 72, 01, 20, 2B, 85, 5C, 72, 01, 20, 8B, 00, 89, 85, F2, 73, 01, 20, 83, BD, F2, 73, 01, 20, 00, 0F, 84, A9, 02, 00, 00, 83, BD, EA, 73, 01, 20, 00, 0F, 84, 9C, 02, 00, 00, 8D, 85, 8D, 74, 01, 20, 50, FF, 95, EA, 73, 01, 20, 83, F8, 00, 0F, 84, 86...
 
[+]

Entropy:
7.2225

Packer / compiler:
ASPack v1.08.04

Code size:
31.5 KB (32,256 bytes)

Windows Firewall Allowed Program
Name:
league of legends lobby


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ec2-54-191-129-219.us-west-2.compute.amazonaws.com  (54.191.129.219:443)

TCP (HTTP SSL):
Connects to a201-016-134-056.deploy.akamaitechnologies.com  (201.16.134.56:443)

TCP (HTTP SSL):
Connects to a201-016-134-048.deploy.akamaitechnologies.com  (201.16.134.48:443)

TCP (HTTP SSL):
Connects to a201-016-134-040.deploy.akamaitechnologies.com  (201.16.134.40:443)

TCP (HTTP SSL):
Connects to ec2-35-164-104-40.us-west-2.compute.amazonaws.com  (35.164.104.40:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-mia1.fbcdn.net  (31.13.73.7:443)

TCP (HTTP SSL):
Connects to server-54-230-57-151.gru1.r.cloudfront.net  (54.230.57.151:443)

TCP (HTTP SSL):
Connects to ec2-50-112-119-109.us-west-2.compute.amazonaws.com  (50.112.119.109:443)

TCP (HTTP SSL):
Connects to ec2-35-164-147-145.us-west-2.compute.amazonaws.com  (35.164.147.145:443)

TCP (HTTP SSL):
Connects to algartelecom-fac001.cache.google.com  (189.112.10.49:443)

TCP (HTTP SSL):
Connects to a23-44-179-123.deploy.static.akamaitechnologies.com  (23.44.179.123:443)

TCP (HTTP SSL):
Connects to a23-38-158-211.deploy.static.akamaitechnologies.com  (23.38.158.211:443)

TCP (HTTP SSL):
Connects to a23-38-147-195.deploy.static.akamaitechnologies.com  (23.38.147.195:443)

Remove lolclient.exe - Powered by Reason Core Security