[rapidfiles]id_42016.exe

SAFOPLAT, LLC

The application [rapidfiles]id_42016.exe by SAFOPLAT has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
SAFOPLAT, LLC  (signed and verified)

MD5:
402ae26302b1ba94f0e815b25f87c8da

SHA-1:
cb55bfae5170da01b2b238a5e4753b6cff535c16

SHA-256:
52c6956be6b3ccbda3c5cb7ecbb093d9969b90ece6a20a03f8924eea20ce8f6f

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 4:45:30 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Bundler
17.3.15.16

File size:
1.3 MB (1,319,944 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\[rapidfiles]id_42016.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/23/2017 10:00:00 PM

Valid to:
5/28/2017 8:59:59 PM

Subject:
CN="SAFOPLAT, LLC", O="SAFOPLAT, LLC", STREET="Esenina, 116/1, 910", L=Rjazan, S=RU, PostalCode=390046, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
45B645066C5DE7AF08464F93FC20921B

File PE Metadata
Compilation timestamp:
3/15/2017 1:06:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

Entry address:
0x124400

Entry point:
55, 8B, EC, 6A, FF, 68, 58, 81, 52, 00, 68, CC, 50, 52, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 38, 80, 52, 00, 33, D2, 8A, D4, 89, 15, F4, C2, 52, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, F0, C2, 52, 00, C1, E1, 08, 03, CA, 89, 0D, EC, C2, 52, 00, C1, E8, 10, A3, E8, C2, 52, 00, 33, F6, 56, E8, 16, 0B, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, E1, 07, 00, 00, FF, 15, E8, 80, 52, 00, A3, F8, C7, 52, 00, E8...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
1.2 MB (1,208,320 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-154-230-42.eu-west-1.compute.amazonaws.com  (54.154.230.42:80)

TCP (HTTP):
Connects to 67.215.238.66.static.quadranet.com  (67.215.238.66:80)

TCP (HTTP):
Connects to wl105-wv21.wedos.net  (46.28.106.37:80)

TCP (HTTP):
Connects to ju171.jupiter.fastwebserver.de  (89.163.148.171:80)

TCP (HTTP):
Connects to server-54-230-206-121.atl50.r.cloudfront.net  (54.230.206.121:80)

TCP (HTTP):
Connects to ip148.ip-178-33-174.eu  (178.33.174.148:80)

TCP (HTTP):
Connects to server-54-230-81-30.mia50.r.cloudfront.net  (54.230.81.30:80)

TCP (HTTP):
Connects to server-54-230-163-90.jax1.r.cloudfront.net  (54.230.163.90:80)

TCP (HTTP):
Connects to server-54-230-0-163.lhr5.r.cloudfront.net  (54.230.0.163:80)

TCP (HTTP):
Connects to server-52-85-133-87.iad53.r.cloudfront.net  (52.85.133.87:80)

TCP (HTTP):
Connects to server-52-85-133-227.iad53.r.cloudfront.net  (52.85.133.227:80)

TCP (HTTP):
Connects to server-52-84-126-75.iad16.r.cloudfront.net  (52.84.126.75:80)

TCP (HTTP SSL):
Connects to usta01.proinity.net  (209.133.193.138:443)

TCP (HTTP):
Connects to server-54-240-186-227.mad50.r.cloudfront.net  (54.240.186.227:80)

TCP (HTTP):
Connects to server-54-240-186-18.mad50.r.cloudfront.net  (54.240.186.18:80)

TCP (HTTP):
Connects to server-54-239-132-174.sfo9.r.cloudfront.net  (54.239.132.174:80)

TCP (HTTP):
Connects to server-54-230-81-61.mia50.r.cloudfront.net  (54.230.81.61:80)

TCP (HTTP):
Connects to server-54-230-59-6.gru1.r.cloudfront.net  (54.230.59.6:80)

TCP (HTTP):
Connects to server-54-230-59-248.gru1.r.cloudfront.net  (54.230.59.248:80)

TCP (HTTP):
Connects to server-54-230-51-231.jfk5.r.cloudfront.net  (54.230.51.231:80)

Remove [rapidfiles]id_42016.exe - Powered by Reason Core Security