Movier.exe

Movier

The application Movier.exe has been detected as a potentially unwanted program by 24 anti-malware scanners. While running, it connects to the Internet address 69-167-127-59.veoh.com on port 80 using the HTTP protocol.
Publisher:
Movier

Product:
Movier

Version:
1.1.5.0

MD5:
77817ed9c490d4beebb2f92573b65675

SHA-1:
caabef0b9a907ea6dacd92ae26f4ce4429128c57

SHA-256:
b5e25067077cf0596de9bbcdbde59a7635eb70e802e0ccdfb7e1b5745a0c91a3

Scanner detections:
24 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2017 7:28:56 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.12336908
710

Agnitum Outpost
Riskware.Hoax
7.1.1

AhnLab V3 Security
Trojan/Win32.Gen
2015.02.24

Avira AntiVirus
Joke/ArchSMS.1372160
7.11.212.60

Antiy Labs AVL
HackTool[Hoax]/Win32.ArchSMS
1.0.0.1

Baidu Antivirus
Trojan.Win32.BadJoke
4.0.3.15224

Bitdefender
Trojan.Generic.12336908
1.0.20.275

Emsisoft Anti-Malware
Trojan.Generic.12336908
8.15.02.24.09

Fortinet FortiGate
Riskware/ArchSMS
2/24/2015

F-Secure
Trojan.Generic.12336908
11.2015-24-02_3

G Data
Trojan.Generic.12336908
15.2.25

IKARUS anti.virus
Hoax.Win32.ArchSMS
t3scan.1.8.6.0

Kaspersky
Hoax.Win32.ArchSMS
14.0.0.2436

McAfee
Artemis!77817ED9C490
5600.6844

McAfee Web Gateway
Artemis
7.6844

nProtect
Trojan.Generic.12336908
15.02.23.01

Panda Antivirus
Trj/CI.A
15.02.24.09

Quick Heal
Hoax.ArchSMS.g4 (Not a Virus)
2.15.14.00

Sophos
Mal/Generic-S
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-ArchSMS
10033

Trend Micro House Call
TROJ_GEN.R047C0EA515
7.2.55

Trend Micro
TROJ_GEN.R047C0EA515
10.465.24

VIPRE Antivirus
Trojan.Win32.Generic
37836

Zillya! Antivirus
Trojan.ArchSMS.Win32.28341
2.0.0.2079

File size:
1.3 MB (1,372,160 bytes)

Product version:
1.1.5.0

Copyright:
Copyright © Movier 2008

Original file name:
Movier.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\movier\movier.exe

File PE Metadata
Compilation timestamp:
11/24/2014 4:03:10 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:mcwjem43iDfG94sPiUtpApjLW1q9b/d7n1nsQA5Ee81:vP2sPLtaLWyx7ts+

Entry address:
0x14781E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1019

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.3 MB (1,333,760 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 166.ip-164-132-99.eu  (164.132.99.166:80)

TCP (HTTP):
Connects to 69-167-127-59.veoh.com  (69.167.127.59:80)

TCP (HTTP):
Connects to 45-166-212-190.enitel.net.ni  (190.212.166.45:80)

TCP (HTTP):
Connects to 24-166-212-190.enitel.net.ni  (190.212.166.24:80)

TCP (HTTP SSL):
Connects to 143.72.46.186.static.pichincha.andinanet.net  (186.46.72.143:443)

Remove Movier.exe - Powered by Reason Core Security