recoverkeysdemo.tmp

ONE UP LTD.

The file recoverkeysdemo.tmp has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address n1plpkivs-v03.any.prod.ams1.secureserver.net on port 80 using the HTTP protocol.
Publisher:
ONE UP LTD.  (signed and verified)

Description:
Setup/Uninstall

Version:
51.1052.0.0

MD5:
1b5de1ae8d0c2127f37e7f3c6c31ae34

SHA-1:
baf49da09c6611b25b99665594439e75698396bf

SHA-256:
f9faacede62c6ad2be2c86d0bc37fa4849f10cd67411d921aa1a0cebdbc5118b

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/25/2024 10:35:18 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Win32.Generic.ONEUP.Installer.Meta
15.9.15.9

File size:
1.4 MB (1,460,176 bytes)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\recoverkeysdemo.tmp

Digital Signature
Signed by:

Authority:
Starfield Technologies, Inc.

Valid from:
4/25/2013 3:33:03 PM

Valid to:
4/25/2016 3:33:03 PM

Subject:
CN=ONE UP LTD., O=ONE UP LTD., L=LEMESOS, S=LEMESOS, C=CY

Issuer:
SERIALNUMBER=10688435, CN=Starfield Secure Certification Authority, OU=http://certificates.starfieldtech.com/repository, O="Starfield Technologies, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
041ABD63CA5DA9

File PE Metadata
Compilation timestamp:
10/13/2013 10:19:33 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:34VN4kkKF3hDXq8xeidJLvktRskkkkJBcTgoALoyo52ZEdB+geo4vx97CV:oT90D3D2wBLQq

Entry address:
0xFF004

Entry point:
55, 8B, EC, 83, C4, F0, 53, 56, 57, B8, B4, D1, 4F, 00, E8, 25, 9F, F0, FF, 6A, EC, A1, 08, 2E, 50, 00, 8B, 00, 8B, 98, 70, 01, 00, 00, 53, E8, B8, AD, F0, FF, 25, 7F, FF, FF, FF, 50, 6A, EC, A1, 08, 2E, 50, 00, 53, E8, 0D, B0, F0, FF, 33, C0, 55, 68, 7F, F0, 4F, 00, 64, FF, 30, 64, 89, 20, 6A, 01, E8, 60, A7, F0, FF, E8, 9F, DE, FF, FF, A1, EC, CD, 4F, 00, 50, 68, 50, CE, 4F, 00, A1, 08, 2E, 50, 00, 8B, 00, E8, 48, CE, F7, FF, E8, F3, DE, FF, FF, 33, C0, 5A, 59, 59, 64, 89, 10, EB, 19, E9, 5C, 56, F0, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
1015 KB (1,039,360 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to n1plpkivs-v03.any.prod.ams1.secureserver.net  (188.121.36.239:80)

TCP (HTTP SSL):
Connects to recover-keys.com  (67.227.206.155:443)

Remove recoverkeysdemo.tmp - Powered by Reason Core Security