server.exe

{70166A21-2F6A-4CC0-822C-607696D8F4B7}

The executable server.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘babe8364d0b44de2ea6e4bcccd70281e’.
Publisher:

MD5:
6dc208126a3973ccaca4b173e51d1357

SHA-1:
a92c356c03877491b284b5010e57f2be721023ee

SHA-256:
28beabfb9b4096ee3d7db5a8752476e2b2cd5797668d72e7be3be06331e85a37

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/23/2024 2:05:17 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Trojan.Server.Zusy (H)
16.9.13.14

File size:
423.1 KB (433,216 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\server.exe

Digital Signature
Authority:
{70166A21-2F6A-4CC0-822C-607696D8F4B7}

Valid from:
4/19/2014 11:47:18 AM

Valid to:
4/19/2015 5:47:18 PM

Subject:
CN={70166A21-2F6A-4CC0-822C-607696D8F4B7}

Issuer:
CN={70166A21-2F6A-4CC0-822C-607696D8F4B7}

Serial number:
3F0DF1EBD88FB1B94D119CFFAC6B01C9

File PE Metadata
Compilation timestamp:
4/23/2014 5:10:07 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:exQ7sh2R2D3Lyc2rKW3B1+Rm/ajd9sScTFJz9oP7fK8mSyT9AvKhAp081nNVjqK5:+Q7sCavh6L8mSyGy6nnjqKoeL

Entry address:
0x346EE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.6458

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
202 KB (206,848 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
babe8364d0b44de2ea6e4bcccd70281e

Command:
"C:\users\{user}\appdata\local\temp\server.exe"..


Remove server.exe - Powered by Reason Core Security