server106.exe

The executable server106.exe has been detected as malware by 32 anti-virus scanners. The program is a setup application that uses the Self-extracting archive installer, however the file is not signed with an authenticode signature from a trusted source.
MD5:
3105b3beb1aaf74102e707514c864a18

SHA-1:
1e0771c864c37f873b1749a21cf4a80098412e47

SHA-256:
6167bddd13d5a09f97d30af822634be6af6637ba8e5dad2fec955c9f7c2d5568

Scanner detections:
32 / 68

Status:
Malware

Analysis date:
4/25/2024 12:47:57 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Dropper.WJD
1017

Agnitum Outpost
Trojan.Autoit.Gen.FK
7.1.1

Avira AntiVirus
TR/Drop.Autoit.R
7.11.141.146

avast!
Win32:Malware-gen
2014.9-140423

AVG
Dropper.Generic_c
2015.0.3495

Baidu Antivirus
Trojan.Win32.Autoit
4.0.3.14423

Bitdefender
Trojan.Dropper.WJD
1.0.20.565

Comodo Security
TrojWare.Win32.Autoit.~CGY
18054

Dr.Web
Trojan.MulDrop5.11598
9.0.1.0113

Emsisoft Anti-Malware
Trojan.Win32.Autoit
8.14.04.23.09

ESET NOD32
Generik.BCICOZT (variant)
8.9639

Fortinet FortiGate
W32/Autoit.CGY!tr
4/23/2014

F-Secure
Trojan.Dropper.WJD
11.2014-23-04_4

G Data
Trojan.Dropper.WJD
14.4.24

IKARUS anti.virus
Worm.Win32.AutoIt
t3scan.2.2.29

K7 AntiVirus
Trojan
13.176.11663

Kaspersky
Trojan.Win32.Autoit
14.0.0.3971

Malwarebytes
Trojan.Agent
v2014.04.23.09

McAfee
RDN/Generic.dx!czf
5600.7151

MicroWorld eScan
Trojan.Dropper.WJD
15.0.0.339

NANO AntiVirus
Trojan.Win32.Autoit.cvbfkb
0.28.0.58873

Norman
Suspicious_Gen4.FWMZY
11.20140423

nProtect
Trojan.Dropper.WJD
14.04.04.01

Panda Antivirus
Trj/CI.A
14.04.23.09

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Sophos
Troj/Malit-K
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Ciusky
10647

Trend Micro House Call
TROJ_GEN.R0CBC0PC614
7.2.113

Trend Micro
TROJ_GEN.R0CBC0PC614
10.465.23

VIPRE Antivirus
Trojan.Win32.Generic
28062

ViRobot
Trojan.Win32.A.Autoit.864738
2011.4.7.4223

XVirus List
Win32.Detected
2.4.23

File size:
844.5 KB (864,738 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Self-extracting archive

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\8c32c0fa\server106.exe

File PE Metadata
Compilation timestamp:
12/1/2013 5:08:23 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:ERWNcr8oxnNZgxa+ui6HVbrq92G3nEUR6Cuw78YOJEn1GUEVQqYHQFOH9LPsv5m7:fNBINZ+aEYF+3EUlu68GGUEtsh7N1cu

Entry address:
0x1D728

Entry point:
E8, F0, 57, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 05, FD, FF, FF, C7, 06, E4, 81, 42, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, E4, 81, 42, 00, E9, BA, FD, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, E4, 81, 42, 00, E8, A7, FD, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, D1, C9, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 08, 8B, 47, 04, 85, C0, 74, 47, 8D, 50, 08, 80, 3A, 00, 74, 3F, 8B, 75, 0C, 8B, 4E, 04, 3B, C1, 74, 14, 83, C1, 08...
 
[+]

Entropy:
7.7920  (probably packed)

Code size:
149.5 KB (153,088 bytes)

Remove server106.exe - Powered by Reason Core Security