server.exe

The executable server.exe has been detected as malware by 38 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘91842158a789a3bd9873c499bba10834’.
MD5:
05f636e2081215b4415efebbdda997b6

SHA-1:
154590e47289448e15bf45851681dfef05869c98

SHA-256:
2d6247c0ebe9943741b83a4684016c5ea11f932f591f2a3bde7d11625aba50f9

Scanner detections:
38 / 68

Status:
Malware

Analysis date:
5/4/2024 1:58:24 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Generic.MSIL.Bladabindi.814C4571
-40

AegisLab AV Signature
Win.Backdoor.Bladabindi.mBi5
2.1.4+

AhnLab V3 Security
Backdoor/Win32.Bladabindi.R91438
3.8.3.16

Avira AntiVirus
TR/Dropper.Gen7
8.3.3.4

Arcabit
Generic.MSIL.Bladabindi.814C4571
1.0.0.802

avast!
MSIL:Agent-DRD [Trj]
2014.9-170315

AVG
PSW.ILUSpy
2018.0.2438

Baidu Antivirus
MSIL.Backdoor.Bladabindi
4.0.3.17315

Bitdefender
Generic.MSIL.Bladabindi.814C4571
1.0.20.370

Bkav FE
W32.KaepitesLTW.Trojan
1.3.0.8876

Clam AntiVirus
Win.Trojan.B-468
0.99.211

Comodo Security
Backdoor.MSIL.Bladabindi.A
26755

Dr.Web
BackDoor.Bladabindi.13678
9.0.1.074

Emsisoft Anti-Malware
Generic.MSIL.Bladabindi.814C4571
8.17.03.15.05

ESET NOD32
MSIL/Bladabindi.AS (variant)
11.15088

Fortinet FortiGate
MSIL/Agent.LI!tr
3/15/2017

F-Prot
W32/MSIL_Bladabindi.AU.gen
v6.4.7.1.166

F-Secure
Generic.MSIL.Bladabindi.814C4571
11.2017-15-03_4

G Data
MSIL.Backdoor.Bladabindi.AV
17.3.A:25.11186B:25.9084

IKARUS anti.virus
Trojan.MSIL.Bladabindi
0.2.1.2

K7 AntiVirus
Trojan
13.10.5.22716

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.-1314

Malwarebytes
Backdoor.Bladabindi.Generic
v2017.03.15.05

McAfee
Trojan-FIGN
5600.6094

Microsoft Security Essentials
Backdoor:MSIL/Bladabindi.B
1.1.13504.0

MicroWorld eScan
Generic.MSIL.Bladabindi.814C4571
18.0.0.222

NANO AntiVirus
Trojan.Win32.Disfa.dtznyx
1.0.70.15657

Qihoo 360 Security
HEUR/QVM03.0.0000.Malware.Gen
1.0.0.1120

Quick Heal
Backdoor.Bladabindi.AL3
3.17.14.00

Rising Antivirus
Backdoor.MSIL.Bladabindi!1.9E49 (classic)
23.00.65.17313

Sophos
Troj/DotNet-P
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Bladabindi
8534

Total Defense
Win32/DotNetDl.A!generic
37.1.62.1

Trend Micro
BKDR_BLADABI.SMC
10.465.15

Vba32 AntiVirus
Trojan.MSIL.Disfa
3.12.26.4

VIPRE Antivirus
Backdoor.MSIL.Bladabindi.a
56644

ViRobot
Backdoor.Win32.Bladabindi.Gen.A[h]
2014.3.20.0

Zillya! Antivirus
Trojan.Disfa.Win32.10634
2.0.0.3232

File size:
23.5 KB (24,064 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\server.exe

File PE Metadata
Compilation timestamp:
3/14/2017 6:03:09 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

Entry address:
0x74AE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
21.5 KB (22,016 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
91842158a789a3bd9873c499bba10834

Command:
"C:\ProgramData\server.exe"..


Remove server.exe - Powered by Reason Core Security