setup_donkeyp2p_1.48ka2.exe

The application setup_donkeyp2p_1.48ka2.exe has been detected as a potentially unwanted program by 27 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from cfile9.uf.tistory.com.
MD5:
6a9a1192f3b1614c99c38367edf25410

SHA-1:
4e1948ab4e587f783719ad74f3e13f02d82042c3

SHA-256:
18fdf155409694a8232bfcad647cd4f13f1b61c4356515378ecce2f17770b8f5

Scanner detections:
27 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 5:05:21 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.38179
293

Agnitum Outpost
Adware.Hotclip
7.1.1

Avira AntiVirus
TR/Downloader.Gen
8.3.2.2

avast!
Win32:Trojan-gen
2014.9-160416

AVG
Generic4
2017.0.2771

Comodo Security
UnclassifiedMalware
23355

Dr.Web
Trojan.DownLoader2.48344
9.0.1.0107

ESET NOD32
Win32/Adware.Hotclip (variant)
10.12355

Fortinet FortiGate
W32/Adware_fam.NB
4/16/2016

F-Prot
W32/Trojan2.MVJX
v6.4.7.1.166

F-Secure
Gen:Variant.Graftor.38179
11.2016-16-04_7

G Data
Win32.Application.Agent.B8I2SR
16.4.25

IKARUS anti.virus
Trojan.Win32.Agent
t3scan.1.9.5.0

K7 AntiVirus
Riskware
13.210.17418

Kaspersky
not-a-virus:AdWare.Win32.Mycashbag
14.0.0.350

Malwarebytes
Adware.Agent
v2016.04.16.11

McAfee
Artemis!6A9A1192F3B1
5600.6427

MicroWorld eScan
Gen:Variant.Graftor.38179
17.0.0.321

NANO AntiVirus
Riskware.Win32.Mycashbag.cljox
0.30.26.3725

Panda Antivirus
Trj/CI.A
16.04.16.11

Quick Heal
Trojan.Agent.r3
4.16.14.00

Sophos
Generic PUA LA (PUA)
4.98

Total Defense
Win32/SillyDl.EQEHENB
37.1.62.1

Trend Micro House Call
ADW_MYCASHBAG
7.2.107

Trend Micro
ADW_MYCASHBAG
10.465.16

Vba32 AntiVirus
AdWare.Mycashbag
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
44292

File size:
5.5 MB (5,790,707 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup_donkeyp2p_1.48ka2.exe

File PE Metadata
Compilation timestamp:
12/6/2009 7:50:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:y50GEZep755OfWnrMcoYmUhW81u7F6mMlDLXvCyLrg9RpWzYy7qLRx5VVFcFyJsm:NGEZ6AMQZUD1+snf5K/oY4qL3Bhye+8v

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9977

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file setup_donkeyp2p_1.48ka2.exe has been seen being distributed by the following URL.

Remove setup_donkeyp2p_1.48ka2.exe - Powered by Reason Core Security