nsi2030.tmp

The file nsi2030.tmp has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from s3.amazonaws.com. While running, it connects to the Internet address server-54-192-55-190.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
MD5:
9d6918b4f5b4a93adbfb24b2f60b21f5

SHA-1:
3ab46531f56d1823be0feb6a2075bb79e67ce3ea

SHA-256:
249d6daced4a95857d2864ec4f76f53b0fdbc5d74d03d194f43c5eb7f4a865ed

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 5:05:29 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.VOPackage
2015.10.22

Arcabit
PUP.Adware.ConvertAd
1.0.0.585

Baidu Antivirus
Adware.Win32.Vopak
4.0.3.151126

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1237

Panda Antivirus
Generic Suspicious
15.11.26.06

File size:
230.3 KB (235,862 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nsi2030.tmp

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:Ge340z83uPz67EwKrw101hw4I6jL7SPgfh:DbJlw13l6T6gfh

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nsi2030.tmp has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-55-190.jfk6.r.cloudfront.net  (54.192.55.190:80)

TCP (HTTP):
Connects to ec2-52-1-45-42.compute-1.amazonaws.com  (52.1.45.42:80)

TCP (HTTP):
Connects to ec2-23-23-142-135.compute-1.amazonaws.com  (23.23.142.135:80)

Remove nsi2030.tmp - Powered by Reason Core Security