perl.exe

ActivePerl

ActiveState

The executable perl.exe, “Perl Command Line Interpreter” has been detected as malware by 40 anti-virus scanners. Infected by a mass-mailing worm and virus that sends itself to email addresses gathered from the compromised computer and exploits remote vulnerabilities and attempts to infect files.
Publisher:
ActiveState

Product:
ActivePerl

Description:
Perl Command Line Interpreter

Version:
5,8,9,827

MD5:
b9dbbc21cfd4414c82ccf863f1c07a74

SHA-1:
78f88717be2fc65d7f8c250c65055bc8c4694f37

SHA-256:
e40c76163d0a8196ba7420add82fc79821e96d91dd506439eca6ff328f601e5b

Scanner detections:
40 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/25/2024 11:04:13 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Runouce.B@mm
813

Agnitum Outpost
I-Worm.Chir.B
7.1.1

AhnLab V3 Security
Win32/ChiHack.6652
2014.11.14

Avira AntiVirus
W32/Chir.B
7.11.30.172

avast!
Win32:Oncer
141025-0

AVG
Win32/Chir.B@mm
2014.0.4189

Baidu Antivirus
Virus.Win32.Runouce.$a
4.0.3.141113

Bitdefender
Win32.Runouce.B@mm
1.0.20.1585

Bkav FE
W32.ChirBPE
1.3.0.4959

Clam AntiVirus
WIN.Worm.Brontok
0.98/21411

Comodo Security
EmailWorm.Win32.Runonce.~v001
20071

Dr.Web
Win32.Runonce.6652
9.0.1.05190

Emsisoft Anti-Malware
Win32.Runouce.B@mm
14.11.13

ESET NOD32
Win32/Chir.B virus
7.0.302.0

Fortinet FortiGate
W32/Chir.B@mm
11/13/2014

F-Prot
W32/Thecid.B@mm
4.6.5.141

F-Secure
Win32.Runouce.B@mm
11.2014-13-11_5

G Data
Win32.Runouce.B@mm
14.11.24

IKARUS anti.virus
Email-Worm.Win32.Runouce
t3scan.1.8.3.0

K7 AntiVirus
EmailWorm
13.185.14007

Kaspersky
Email-Worm.Win32.Runouce
15.0.0.543

Malwarebytes
Virus.Chir
v2014.11.13.04

McAfee
W32/Chir.b@MM
5600.6947

Microsoft Security Essentials
Threat.Undefined
1.187.2101.0

MicroWorld eScan
Win32.Runouce.B@mm
15.0.0.951

NANO AntiVirus
Virus.Win32.Runouce.bxafx
0.28.6.63362

Norman
Malware
11.20141113

nProtect
Win32.Runouce.B@mm
14.11.13.01

Panda Antivirus
Generic Malware
14.11.13.04

Qihoo 360 Security
Virus.Win32.CNHacker.C
1.0.0.1015

Quick Heal
W32.Runouce.B
11.14.14.00

Rising Antivirus
PE:Worm.ChineseHacker-2!23772
23.00.65.141111

Sophos
W32/Chir-B
4.98

Total Defense
Win32/Chir.B
37.0.11277

Trend Micro House Call
PE_Chir.B
7.2.317

Trend Micro
PE_Chir.B
10.465.13

Vba32 AntiVirus
Virus.Win32.Chur.A
3.12.26.3

VIPRE Antivirus
Threat.219451
34232

ViRobot
Win32.Chir.B
2011.4.7.4223

Zillya! Antivirus
Worm.Runouce.Win32.2
2.0.0.1982

File size:
50.6 KB (51,789 bytes)

Product version:
Build 827 [291969]

Copyright:
Copyright 1987-2007, Larry Wall, Binary build by ActiveState, http://www.ActiveState.com

Original file name:
perl.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\matlab\r2010b\sys\perl\win32\bin\perl.exe

File PE Metadata
Compilation timestamp:
1/27/2010 8:16:54 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

CTPH (ssdeep):
384:2nq4btVikuQhKY3o9tCz2AbUZmikdEYinS3Wiqis9Qlcffyqcez:2FZxuQhKY3gmuS6YJEisKl4q7

Entry address:
0xB051

Entry point:
60, E8, E6, 19, 00, 00, 8B, 74, 24, 20, E8, 08, 00, 00, 00, 61, 68, 16, 10, 40, 00, C3, E9, 59, E8, 01, 16, 00, 00, 81, E6, 00, F0, FF, FF, 81, EE, 00, 10, 00, 00, 66, 81, 3E, 4D, 5A, 75, F3, 0F, B7, 7E, 3C, 03, FE, 8B, 6F, 78, 03, EE, 8B, 5D, 20, 03, DE, 33, C0, 8B, D6, 83, C3, 04, 40, 8B, 3B, 03, FA, E8, 0F, 00, 00, 00, 47, 65, 74, 50, 72, 6F, 63, 41, 64, 64, 72, 65, 73, 73, 00, 5E, 33, C9, B1, 0F, FC, F3, A6, 75, DA, 8B, F2, 8B, 5D, 24, 03, DE, 0F, B7, 0C, 43, 8B, 5D, 1C, 03, DE, 8B, 1C, 8B, 03, DE, 81...
 
[+]

Entropy:
3.6283

Packer / compiler:
ASPack v1.08.04

Code size:
4 KB (4,096 bytes)

Remove perl.exe - Powered by Reason Core Security