minecraft 1.7.5 force op hack download working on bukkit and__10967_i1533564688_il536794.exe

The executable minecraft 1.7.5 force op hack download working on bukkit and__10967_i1533564688_il536794.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from www.auto-sleepy-files-hurricane6.biz.
Version:
1.1.5.26

MD5:
f59d4cab97c3d3cdb1d652642aeade34

SHA-1:
6e56e77e0ff605ba1670b1b20f37fad63c4896e1

SHA-256:
732c4f554c109b48102f40b16b88557c27385b6fea1667f932523890fcf50f15

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
5/4/2024 9:50:55 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation.IMP
16.7.2.8

File size:
600 KB (614,400 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\minecraft 1.7.5 force op hack download working on bukkit and__10967_i1533564688_il536794.exe

File PE Metadata
Compilation timestamp:
6/5/2015 10:15:00 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:HMdco3A7hWWYt4ta5A02qI8e95ikcNemM0JNmu1facYVv:HqQ7Mp4ta5A9Hive7wpYV

Entry address:
0xAEC2

Entry point:
E8, 7B, 2B, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 48, CA, 37, 00, 85, C0, 75, 1D, E8, 76, 15, 00, 00, 6A, 1E, E8, CC, 15, 00, 00, 68, FF, 00, 00, 00, E8, 1E, 18, 00, 00, A1, 48, CA, 37, 00, 59, 59, 85, F6, 74, 04, 8B, CE, EB, 03, 33, C9, 41, 51, 6A, 00, 50, FF, 15, 68, 30, 37, 00, 8B, F8, 85, FF, 75, 26, 6A, 0C, 5B, 39, 05, 60, CD, 37, 00, 74, 0D, 56, E8, 62, 02, 00, 00, 59, 85, C0, 75, A9, EB, 07, E8, 77, 1F, 00, 00, 89, 18, E8, 70, 1F, 00, 00, 89, 18, 8B...
 
[+]

Entropy:
7.7265  (probably packed)

Code size:
69.5 KB (71,168 bytes)

The file minecraft 1.7.5 force op hack download working on bukkit and__10967_i1533564688_il536794.exe has been seen being distributed by the following URL.