nsc49df.tmp

The file nsc49df.tmp has been detected as a potentially unwanted program by 10 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from s3.amazonaws.com. While running, it connects to the Internet address server-54-230-52-251.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
a2960f7d01b378ac89f3bd7b1c082dd8

SHA-1:
f48bc2ea3cad6929f9475c836472ecea61517edf

SHA-256:
ca27fdc2d309db4318accd8e73a85bb3b0d0f0ff5ffc94e35aa75e67e97ec5e4

Scanner detections:
10 / 68

Status:
Potentially unwanted

Analysis date:
4/24/2024 5:48:58 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.VOPackage
2015.12.05

Avira AntiVirus
ADWARE/Vopak.252084
8.3.2.4

Arcabit
PUP.Adware.ConvertAd
1.0.0.628

avast!
Win32:Dropper-gen [Drp]
2014.9-160103

Baidu Antivirus
Adware.Win32.Vopak
4.0.3.1613

Kaspersky
not-a-virus:AdWare.Win32.Vopak
14.0.0.871

McAfee
Artemis!A2960F7D01B3
5600.6531

Panda Antivirus
Generic Suspicious
16.01.03.05

Trend Micro
TROJ_GEN.R047C0OL115
10.465.03

VIPRE Antivirus
Adware.Win32.Vopak
45614

File size:
246.2 KB (252,084 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsc49df.tmp

File PE Metadata
OS bitness:
Win64

CTPH (ssdeep):
6144:Se34QvMZqnbEzW1NiVDpLXuYJ1cTbyRO05G3c7:tMKP1NiVhJOTbyRb5Gs7

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.8920

Packer / compiler:
Nullsoft install system v2.x

The file nsc49df.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-53-82.jfk6.r.cloudfront.net  (54.230.53.82:80)

TCP (HTTP):
Connects to server-54-230-52-251.jfk6.r.cloudfront.net  (54.230.52.251:80)

TCP (HTTP):
Connects to server-54-192-55-83.jfk6.r.cloudfront.net  (54.192.55.83:80)

TCP (HTTP):
Connects to server-54-192-55-28.jfk6.r.cloudfront.net  (54.192.55.28:80)

TCP (HTTP):
Connects to server-205-251-251-94.jfk5.r.cloudfront.net  (205.251.251.94:80)

TCP (HTTP):
Connects to server-205-251-251-79.jfk5.r.cloudfront.net  (205.251.251.79:80)

TCP (HTTP):
Connects to server-205-251-251-28.jfk5.r.cloudfront.net  (205.251.251.28:80)

TCP (HTTP):
Connects to server-205-251-251-241.jfk5.r.cloudfront.net  (205.251.251.241:80)

TCP (HTTP):
Connects to server-205-251-251-105.jfk5.r.cloudfront.net  (205.251.251.105:80)

TCP (HTTP):
Connects to ec2-54-225-164-100.compute-1.amazonaws.com  (54.225.164.100:80)

TCP (HTTP):
Connects to ec2-52-1-45-42.compute-1.amazonaws.com  (52.1.45.42:80)

TCP (HTTP):
Connects to ec2-107-22-235-143.compute-1.amazonaws.com  (107.22.235.143:80)

Remove nsc49df.tmp - Powered by Reason Core Security