ssl.exe

The executable ssl.exe has been detected as malware by 38 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘58a9b267cb0cdc0e3614c6b35f54d910’. The file has been seen being downloaded from www.weebly.com.
MD5:
1898a907666d503d1e5e6fc8a6c1a6d8

SHA-1:
b649aa1f9763296f510561b664c3ebf1a1e7e435

SHA-256:
982f848ab5f017c6f220c8513e65c401218de04d80261ec32dc67c91f6e56608

Scanner detections:
38 / 68

Status:
Malware

Analysis date:
4/25/2024 5:24:22 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.80820
254

AegisLab AV Signature
Troj.W32.Generic!c
2.1.4+

AhnLab V3 Security
Trojan/Win32.Generic
2016.04.03

Avira AntiVirus
TR/Bladabindi.450560.24
8.3.3.4

Arcabit
Trojan.Zusy.D13BB4
1.0.0.666

avast!
MSIL:GenMalicious-BPD [Trj]
2014.9-160526

AVG
MSIL3
2017.0.2732

Baidu Antivirus
Win32.Trojan.WisdomEyes.151026.9950
4.0.3.16526

Bitdefender
Gen:Variant.Zusy.80820
1.0.20.735

Bkav FE
W32.OnuquikLTS.Trojan
1.3.0.7744

Clam AntiVirus
Win.Trojan.Agent-1117642
0.98/21511

Comodo Security
TrojWare.MSIL.Kryptik.rh
24733

Dr.Web
Win32.HLLW.Autoruner.25074
9.0.1.0147

Emsisoft Anti-Malware
Gen:Variant.Zusy.80820
8.16.05.26.03

ESET NOD32
MSIL/Bladabindi.AH (variant)
10.13275

Fortinet FortiGate
MSIL/FrauDrop.RH!tr
5/26/2016

F-Secure
Gen:Variant.Zusy.80820
11.2016-26-05_5

G Data
Gen:Variant.Zusy.80820
16.5.25

IKARUS anti.virus
Trojan.MSIL2
t3scan.2.0.9.0

K7 AntiVirus
Trojan
13.220.19193

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.154

Malwarebytes
Trojan.Agent.MSIL
v2016.05.26.03

McAfee
Artemis!1898A907666D
5600.6388

Microsoft Security Essentials
Trojan:Win32/Dacic.A!rfn
1.1.12603.0

MicroWorld eScan
Gen:Variant.Zusy.80820
17.0.0.441

NANO AntiVirus
Trojan.Win32.Autoruner.dbiffi
1.0.18.7201

Panda Antivirus
Trj/Dtcontx.J
16.05.26.03

Qihoo 360 Security
Win32/Trojan.e6d
1.0.0.1120

Quick Heal
Backdoor.Bladabindi.r3
5.16.14.00

Rising Antivirus
PE:Malware.Generic/QRS!1.9E2D [F]
23.00.65.16524

Sophos
Mal/Generic-S
4.98

Total Defense
Win32/Tnega.TFGaSNB
37.1.62.1

Trend Micro House Call
TROJ_SPNR.06BN14
7.2.147

Trend Micro
TROJ_SPNR.06BN14
10.465.26

Vba32 AntiVirus
TrojanDownloader.Andromeda
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
48354

ViRobot
Trojan.Win32.S.Agent.448003.A[h]
2014.3.20.0

Zillya! Antivirus
Trojan.Zapchast.Win32.21072
2.0.0.2758

File size:
437.5 KB (448,003 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\ssl.exe

File PE Metadata
Compilation timestamp:
1/14/2014 8:16:33 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:0Ado0cuBGKbkouXo8+G+alXfZxVlxvR9v05ycRRamW23LVLPKf:0ARLG6/G+alXfZx1fsRRRRjVP4

Entry address:
0x314E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
3.3640

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
4.5 KB (4,608 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
58a9b267cb0cdc0e3614c6b35f54d910

Command:
"C:\users\{user}\appdata\roaming\ssl.exe"..


The file ssl.exe has been seen being distributed by the following URL.

Remove ssl.exe - Powered by Reason Core Security