nemar.exe

The executable nemar.exe has been detected as malware by 37 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘0ea6602f688bf515c8e0367b0a8c4d35’.
MD5:
89af69bf4cc1807722020039ebae09ed

SHA-1:
dacadfce80e087222c3b4886857b181c217c5a01

SHA-256:
800f87042d9995f97be3b110a493691ea832c226f4e5b9aec425b27e67da4a66

Scanner detections:
37 / 68

Status:
Malware

Analysis date:
4/19/2024 10:50:17 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Barys.10219
5650986

Agnitum Outpost
Trojan.Agent
7.1.1

AhnLab V3 Security
Win-Trojan/Zbot.24064
2015.04.21

Avira AntiVirus
TR/Dropper.Gen7
3.6.1.96

avast!
MSIL:GenMalicious-V [Trj]
150414-0

AVG
PSW.ILUSpy
2016.0.3133

Bitdefender
Gen:Variant.Barys.10219
1.0.20.555

Clam AntiVirus
Win.Backdoor.Bladabindi-1
0.98/20350

Comodo Security
Backdoor.MSIL.Bladabindi.A
21841

Dr.Web
BackDoor.Bladabindi.1056
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Barys.10219
9.0.0.4799

ESET NOD32
MSIL/Bladabindi.BC trojan
7.0.302.0

Fortinet FortiGate
MSIL/Bladabindi.SMC!tr
4/21/2015

F-Prot
W32/MSIL_Bladabindi.G.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Barys.10219
5.13.68

G Data
Gen:Variant.Barys.10219
15.4.25

IKARUS anti.virus
Backdoor.MSIL.Agent
t3scan.1.8.9.0

K7 AntiVirus
Trojan
13.180.12538

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.2159

Malwarebytes
Trojan.MSIL
v2015.04.21.04

McAfee
BackDoor-FBIB!4BD6624D895D
5600.6789

Microsoft Security Essentials
Threat.Undefined
1.197.2.0

MicroWorld eScan
Trojan.GenericKDZ.24293
16.0.0.333

NANO AntiVirus
Trojan.Win32.DownLoader11.cxfbrl
0.30.20.1219

Norman
Bladabindi.JQ
11.20150421

nProtect
Trojan/W32.Agent.24064.UQ
14.06.26.02

Panda Antivirus
Generic Malware
15.04.21.04

Quick Heal
Backdoor.Bladabindi.AL3
4.15.14.00

Sophos
Troj/DotNet-P
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Bladabindi
9923

Total Defense
Win32/DotNetDl.A!generic
37.0.11023

Trend Micro House Call
BKDR_BLBINDI.SMN
7.2.111

Trend Micro
BKDR_BLBINDI.SMN
10.465.21

Vba32 AntiVirus
Backdoor.MSIL.Agent
3.12.26.3

VIPRE Antivirus
Backdoor.MSIL.Bladabindi.a
30692

Zillya! Antivirus
Trojan.Disfa.Win32.10565
2.0.0.2145

File size:
23.5 KB (24,064 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\nemar.exe

File PE Metadata
Compilation timestamp:
4/19/2015 2:43:36 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:ssqS+ER6vRKXGYKRWVSujUtX9w6Dglo61Z5DVmRvR6JZlbw8hqIusZzZGL:zf65K2Yf1jKRpcnu3

Entry address:
0x747E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
21.5 KB (22,016 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
0ea6602f688bf515c8e0367b0a8c4d35

Command:
"C:\users\{user}\appdata\local\temp\nemar.exe"..


Remove nemar.exe - Powered by Reason Core Security