nscc9df.tmp

The file nscc9df.tmp has been detected as a potentially unwanted program by 19 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from livestatscounter.com. While running, it connects to the Internet address dl21.clickmein.com on port 80 using the HTTP protocol.
Version:
1.0.0.0

MD5:
8b2b6269d696c1a5d7a4852058b280e0

SHA-1:
bf4a579e5b15fb65abf75063f572dd52239f1ca9

SHA-256:
0bf2933e0ee2b972ba34a6577504371003e62bbe934f6422d9ba78519e834f11

Scanner detections:
19 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 8:42:11 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2498756
570

Arcabit
Trojan.Generic.D2620C4
1.0.0.425

avast!
Win32:Dropper-gen [Drp]
2014.9-150715

Baidu Antivirus
Adware.Win32.Downloader
4.0.3.15715

Bitdefender
Trojan.GenericKD.2498756
1.0.20.980

Emsisoft Anti-Malware
Trojan.GenericKD.2498756
8.15.07.15.04

ESET NOD32
Win32/Adware.ConvertAd.TH.gen (variant)
9.11830

F-Secure
Trojan.GenericKD.2498756
11.2015-15-07_4

G Data
Trojan.GenericKD.2498756
15.7.25

K7 AntiVirus
Adware
13.205.16328

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1877

MicroWorld eScan
Trojan.GenericKD.2498756
16.0.0.588

nProtect
Trojan.GenericKD.2498756
15.06.23.01

Panda Antivirus
Generic Suspicious
15.07.15.04

Qihoo 360 Security
HEUR/QVM42.1.Malware.Gen
1.0.0.1015

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_DLOADR.YMNIZ
7.2.196

Trend Micro
TROJ_DLOADR.YMNIZ
10.465.15

VIPRE Antivirus
Trojan.Win32.Generic
41384

File size:
276.8 KB (283,393 bytes)

Product version:
1.0.0.0

Copyright:
Copyright 2013

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\nscc9df.tmp

File PE Metadata
Compilation timestamp:
12/5/2009 4:50:35 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:izf3OYED/AkNJWSln0HwN4wGcYn7vM5GKRNdKJwTWD2:kOYcAclgwSw0CdRX4wTB

Entry address:
0x323F

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 98, 27, 7A, 00, E8, 09, 2C, 00, 00, A3, E4, 26, 7A, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, DC, 79, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, E0, 1E, 7A, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 80, 7A, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.8771

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file nscc9df.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-23-21-176-144.compute-1.amazonaws.com  (23.21.176.144:80)

TCP (HTTP):
Connects to dl21.clickmein.com  (216.227.128.186:80)

Remove nscc9df.tmp - Powered by Reason Core Security