ppp2.exe

Fenstername

Bitsum Technologies

The executable ppp2.exe has been detected as malware by 35 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘UPNmedia’. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server.
Publisher:
Bitsum Technologies  (signed and verified)

Product:
Fenstername

Description:
auffrischte

Version:
5.07

MD5:
6d266f799b84491e00568e5093acf9ca

SHA-1:
158d6b6f0d1acb67f7abb8998db8cfc4a081bb25

SHA-256:
9f747cb3b115c69f0f4f5c7b3e7e2d9af015414a4793da9151be05a30b044b3e

Scanner detections:
35 / 68

Status:
Malware

Analysis date:
4/26/2024 8:09:27 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Heur.Jatif.47
388

Agnitum Outpost
Trojan.Boaxxe
7.1.1

AhnLab V3 Security
Trojan/Win32.MDA
2015.02.12

Avira AntiVirus
TR/Agent.198672
7.11.209.206

avast!
Win32:Dropper-gen [Drp]
2014.9-160112

AVG
Generic_vb
2017.0.2866

Baidu Antivirus
Trojan.Win32.VBKryjetor
4.0.3.16112

Bitdefender
Gen:Heur.Jatif.47
1.0.20.60

Comodo Security
UnclassifiedMalware
21046

Dr.Web
Trojan.Siggen6.23087
9.0.1.012

Emsisoft Anti-Malware
Gen:Heur.Jatif.47
8.16.01.12.04

ESET NOD32
Win32/Boaxxe.BR
10.11163

Fortinet FortiGate
W32/Boaxxe.BR!tr
1/12/2016

F-Secure
Gen:Heur.Jatif.47
11.2016-12-01_3

G Data
Gen:Heur.Jatif.47
16.1.25

IKARUS anti.virus
Trojan.Win32.Boaxxe
t3scan.1.8.6.0

K7 AntiVirus
Trojan
13.194.14941

Kaspersky
Trojan.Win32.VBKryjetor
14.0.0.827

Malwarebytes
Spyware.Zbot.ED
v2016.01.12.04

McAfee
Trojan-FFMD!6D266F799B84
5600.6522

Microsoft Security Essentials
Trojan:Win32/Miuref
1.1.11302.0

MicroWorld eScan
Gen:Heur.Jatif.47
17.0.0.36

NANO AntiVirus
Trojan.Win32.Siggen6.djejso
0.30.0.65070

Norman
Troj_Generic.XIUPY
11.20160112

Panda Antivirus
Trj/CI.A
16.01.12.04

Qihoo 360 Security
Trojan.Generic
1.0.0.1015

Quick Heal
TrojanPWS.Zbot.S3
1.16.14.00

Sophos
Mal/Generic-S
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Zbot
9390

Total Defense
Win32/Tnega.NVPDYLB
37.0.11436

Trend Micro House Call
TROJ_GEN.F0CBOC0LC14
7.2.12

Trend Micro
TROJ_GEN.F0CBOC0LC14
10.465.12

VIPRE Antivirus
Trojan.Win32.Generic
37466

ViRobot
Trojan.Win32.S.Agent.198672.A[h]
2014.3.20.0

Zillya! Antivirus
Trojan.VBKryjetor.Win32.189
2.0.0.2062

File size:
194 KB (198,672 bytes)

Product version:
5.07

Copyright:
durchflutender

Trademarks:
Beschreibungsmerkmals

Original file name:
Kleidungsgröße4 Fahndungsmethode5.exe

File type:
Executable application (Win32 EXE)

Language:
Chinese (Traditional, Taiwan)

Common path:
C:\users\{user}\appdata\local\upnmedia\ppp2.exe

Digital Signature
Authority:
The USERTRUST Network

Valid from:
10/1/2009 7:00:00 AM

Valid to:
10/2/2010 6:59:59 AM

Subject:
CN=Bitsum Technologies, O=Bitsum Technologies, STREET=1605 Allen Rd., L=Talbott, S=TN, PostalCode=37877, C=US

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
00FC594B2E2C30E2B41F4CA24B350BCA89

File PE Metadata
Compilation timestamp:
1/1/2015 7:04:28 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:8N7MySVI+zQB9/rg4BjP6dAcAnP8wA9Ab:8N7MPy+8BZNPeAcAnUwA9Ab

Entry address:
0x1094

Entry point:
68, 50, 39, 42, 00, E8, F0, FF, FF, FF, 00, 00, 00, 00, 00, 00, 30, 00, 00, 00, 38, 00, 00, 00, 00, 00, 00, 00, 26, B7, 29, 0C, FA, D3, 14, 42, 92, AB, 84, 9B, 48, CF, 4E, 66, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 00, 00, 00, 00, 50, 61, 72, 6F, 6C, 69, 00, 00, 00, 00, 00, 00, FF, CC, 31, 00, 05, FB, C0, 52, FE, 5C, 36, 28, 42, 96, D9, B1, E8, 76, 2B, 73, 05, C1, 63, 15, 9E, 67, 4E, 87, 4B, BE, 65, 98, 75, F3, 22, A1, 51, 3A, 4F, AD, 33, 99, 66, CF, 11, B7, 0C, 00, AA, 00, 60, D3, 93, 00, 00, 00...
 
[+]

Entropy:
4.7274

Developed / compiled with:
Microsoft Visual Basic v5.0/v6.0

Code size:
172 KB (176,128 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
UPNmedia

Command:
C:\users\{user}\appdata\local\upnmedia\ppp2.exe


Remove ppp2.exe - Powered by Reason Core Security