radff96a.tmp.exe

The executable radff96a.tmp.exe has been detected as malware by 2 anti-virus scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘svchost.exe’. While running, it connects to the Internet address advancedsearch.virginmedia.com on port 80 using the HTTP protocol.
MD5:
d40c7bcd05c16b3b2c0fb61e174afb13

SHA-1:
78d2a974cd6ce87e98234a87a39d214395e4a631

SHA-256:
d4c907a1e55dec5b66075eb376bd8a66f3a026e4ee395e83f3e324adb117774e

Scanner detections:
2 / 68

Status:
Malware

Analysis date:
4/27/2024 2:15:00 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.DownLoader19.23144
9.0.1.05190

ESET NOD32
Win32/Injector.DFFX trojan
6.3.12010.0

File size:
178.3 KB (182,613 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\radff96a.tmp.exe

File PE Metadata
Compilation timestamp:
10/6/2014 9:40:23 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:E8Dsp+FNX1dFOvDlXJuN45DdS4Tl5gEqj5eFoQaig6XeyCl35OsJwLeaClUOTtkt:E8dNXSEN4dS4Tl5gEY5epaD6Xepl4sJS

Entry address:
0x30E2

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 90, 91, 40, 00, 89, 5C, 24, 20, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, 1C, 71, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 09, A3, 78, E4, 42, 00, E8, A8, 2D, 00, 00, A3, C4, E3, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, 00, 88, 42, 00, FF, 15, 64, 71, 40, 00, 68, 80, 91, 40, 00, 68, C0, DB, 42, 00, E8, 52, 2A, 00, 00, FF, 15, 20, 71, 40, 00, BD, 00, 40, 43, 00, 50, 55, E8, 40, 2A...
 
[+]

Entropy:
7.7352

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
svchost.exe

Command:
C:\users\{user}\appdata\roaming\owzcen323f\svchost.exe


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to advancedsearch.virginmedia.com  (81.200.64.50:80)

Remove radff96a.tmp.exe - Powered by Reason Core Security