saber.exe

Dening Hu

The application saber.exe by Dening Hu has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “winsaber”. While running, it connects to the Internet address server-54-192-19-211.iad12.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Dening Hu  (signed and verified)

MD5:
e78fc8791f02d1f5841b08958b6ffe42

SHA-1:
fa50a7417241084a368c47667e004961530ad9e0

SHA-256:
be09879011b0e75a5b83bdb0fa94f84d313df4cb74ea0c1875f644c5e23a0b74

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 1:55:49 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Elex (M)
16.9.20.6

File size:
509.3 KB (521,496 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\cohughtplebse\saber.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
9/19/2016 8:00:00 PM

Valid to:
6/8/2017 7:59:59 PM

Subject:
CN=Dening Hu, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
28815147F65303725E3AE5B01964312F

File PE Metadata
Compilation timestamp:
9/19/2016 11:22:56 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
14.0

CTPH (ssdeep):
12288:k9Kdzob5baq/attGgjflJrGoKy7C3Il8vUBEH4JEsXL3B5L:k9KaptQzGoJ7CSEHaEE3B5L

Entry address:
0x361DB

Entry point:
E8, 8B, 04, 00, 00, E9, 80, FE, FF, FF, 55, 8B, EC, 56, FF, 75, 08, 8B, F1, E8, 5D, D6, FD, FF, C7, 06, C8, 4E, 46, 00, 8B, C6, 5E, 5D, C2, 04, 00, 83, 61, 04, 00, 8B, C1, 83, 61, 08, 00, C7, 41, 04, D0, 4E, 46, 00, C7, 01, C8, 4E, 46, 00, C3, 55, 8B, EC, 56, FF, 75, 08, 8B, F1, E8, 2A, D6, FD, FF, C7, 06, E4, 4E, 46, 00, 8B, C6, 5E, 5D, C2, 04, 00, 83, 61, 04, 00, 8B, C1, 83, 61, 08, 00, C7, 41, 04, EC, 4E, 46, 00, C7, 01, E4, 4E, 46, 00, C3, 55, 8B, EC, 83, EC, 0C, 8D, 4D, F4, E8, DA, FF, FF, FF, 68, 5C...
 
[+]

Entropy:
6.4586

Code size:
373.5 KB (382,464 bytes)

Service
Display name:
winsaber

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-36-253.jfk1.r.cloudfront.net  (54.192.36.253:80)

TCP (HTTP):
Connects to server-54-192-36-250.jfk1.r.cloudfront.net  (54.192.36.250:80)

TCP (HTTP):
Connects to server-54-230-163-131.jax1.r.cloudfront.net  (54.230.163.131:80)

TCP (HTTP):
Connects to server-54-230-51-149.jfk5.r.cloudfront.net  (54.230.51.149:80)

TCP (HTTP):
Connects to server-54-230-51-115.jfk5.r.cloudfront.net  (54.230.51.115:80)

TCP (HTTP):
Connects to server-54-192-19-148.iad12.r.cloudfront.net  (54.192.19.148:80)

TCP (HTTP):
Connects to server-54-192-19-125.iad12.r.cloudfront.net  (54.192.19.125:80)

TCP (HTTP):
Connects to server-52-84-33-69.ewr50.r.cloudfront.net  (52.84.33.69:80)

TCP (HTTP):
Connects to server-52-84-33-174.ewr50.r.cloudfront.net  (52.84.33.174:80)

TCP (HTTP):
Connects to server-52-84-33-138.ewr50.r.cloudfront.net  (52.84.33.138:80)

TCP (HTTP):
Connects to server-54-230-163-128.jax1.r.cloudfront.net  (54.230.163.128:80)

TCP (HTTP):
Connects to server-54-239-132-142.sfo9.r.cloudfront.net  (54.239.132.142:80)

TCP (HTTP):
Connects to server-54-239-132-132.sfo9.r.cloudfront.net  (54.239.132.132:80)

TCP (HTTP):
Connects to server-54-230-51-42.jfk5.r.cloudfront.net  (54.230.51.42:80)

TCP (HTTP):
Connects to server-54-230-51-101.jfk5.r.cloudfront.net  (54.230.51.101:80)

TCP (HTTP):
Connects to server-54-230-141-48.sfo5.r.cloudfront.net  (54.230.141.48:80)

TCP (HTTP):
Connects to server-54-230-141-248.sfo5.r.cloudfront.net  (54.230.141.248:80)

TCP (HTTP):
Connects to server-54-230-141-242.sfo5.r.cloudfront.net  (54.230.141.242:80)

TCP (HTTP):
Connects to server-54-230-141-202.sfo5.r.cloudfront.net  (54.230.141.202:80)

TCP (HTTP):
Connects to server-54-230-141-154.sfo5.r.cloudfront.net  (54.230.141.154:80)

Remove saber.exe - Powered by Reason Core Security