rootg300.exe

The application rootg300.exe has been detected as a potentially unwanted program by 23 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from dla.uloz.to.
Version:
3, 3, 8, 1

MD5:
91e4eb11c5a9284faa86dd2483171bb5

SHA-1:
fdd4e6ee70890e3881ae68cd5c86f40ed65c2b41

SHA-256:
987e411f630f5b211a2a008a18709231a45c544a36669a953caf04bbd50504a8

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
4/24/2024 10:11:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.12527501
178

Arcabit
Trojan.Generic.DBF278D
1.0.0.425

avast!
ELF:MempoDroid-D [PUP]
2014.9-160809

AVG
Linux/Exploit.MempoDroid
2017.0.2656

Baidu Antivirus
Trojan.Android.MempoDroid
4.0.3.1689

Bitdefender
Trojan.Generic.12527501
1.0.20.1110

Clam AntiVirus
Win.Trojan.11362138
0.98/21511

Comodo Security
Exploit.Android.MempoDroid.A
22554

Dr.Web
Trojan.KillProc.19057
9.0.1.0222

Emsisoft Anti-Malware
Trojan.Generic.12527501
8.16.08.09.03

ESET NOD32
Android/Exploit.MempoDroid
10.11829

F-Secure
Trojan.Generic.12527501
11.2016-09-08_3

G Data
Trojan.Generic.12527501
16.8.25

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.9.5.0

K7 AntiVirus
Trojan
13.205.16325

McAfee
Artemis!91E4EB11C5A9
5600.6312

MicroWorld eScan
Trojan.Generic.12527501
17.0.0.666

nProtect
Trojan.Generic.12527501
15.06.23.01

Qihoo 360 Security
Win32/Trojan.Exploit.286
1.0.0.1015

Quick Heal
Exploit.Mempodroid.A53
8.16.14.00

Sophos
Andr/DroidRt-J
4.98

Trend Micro
TROJ_GEN.R0C1C0EAE15
10.465.09

VIPRE Antivirus
Trojan.Win32.Generic
41384

File size:
1.8 MB (1,844,337 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (Wielka Brytania)

File PE Metadata
Compilation timestamp:
1/29/2012 10:32:28 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:6EVUccYJdOF4DlDmZiJIlX3lH4BMe/OHIvcrfydc:6E3cY2F4BCZiJIVVH4Ke3vczEc

Entry address:
0xC6E90

Entry point:
60, BE, 00, 50, 48, 00, 8D, BE, 00, C0, F7, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
268 KB (274,432 bytes)

The file rootg300.exe has been seen being distributed by the following URL.

Remove rootg300.exe - Powered by Reason Core Security