tofai.exe

Maskiseft Visaal Studio 2010

Maskiseft Corporatien

The executable tofai.exe, “Maskiseft Visaal Studie 2010” has been detected as malware by 29 anti-virus scanners. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time. Accoriding to the detections, it is a variant of Zbot (Zeus), a trojan that attempts to steal confidential information (online credentials, and banking details) from a compromised computer and send it to online criminals via a command-and-control server. While running, it connects to the Internet address float.2050.bm-impbus.prod.nym2.adnexus.net on port 80 using the HTTP protocol.
Publisher:
Maskiseft Corporatien

Product:
Maskiseft® Visaal Studio® 2010

Description:
Maskiseft Visaal Studie 2010

Version:
1.9.43074.5121 built by: SP1Rel

MD5:
fe2b4d87d5e7aec4ad7171dbe1942055

SHA-1:
3b88817f7b839ce2354e46336e02f9019b265cd5

SHA-256:
8a9ed6b8e527d85b4f842a54cc16dc34392cc234e763affc609fb70b69cecdc1

Scanner detections:
29 / 68

Status:
Malware

Analysis date:
4/25/2024 7:31:47 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.430690
904

Agnitum Outpost
Trojan.KillProc
7.1.1

AhnLab V3 Security
Trojan/Win32.Necurs
2014.08.20

Avira AntiVirus
TR/Crypt.XPACK.Gen
7.11.30.172

avast!
Win32:Trojan-gen
2014.9-140815

AVG
Trojan horse SHeur4
2015.0.3382

Bitdefender
Gen:Variant.Kazy.430690
1.0.20.1135

Bkav FE
HW32.CDB
1.3.0.4959

Dr.Web
Trojan.KillProc.32415
9.0.1.0227

Emsisoft Anti-Malware
Gen:Variant.Kazy.430690
9.0.0.4324

ESET NOD32
Win32/Kryptik.CIQR trojan
8.7.0.302.0

Fortinet FortiGate
W32/Kryptik.CHDI!tr
8/15/2014

F-Prot
W32/A-ba027243
v6.4.7.1.166

F-Secure
Gen:Variant.Kazy.430690
11.2014-15-08_6

G Data
Gen:Variant.Kazy.430690
14.8.24

K7 AntiVirus
Trojan
13.183.13098

Malwarebytes
Trojan.Zbot.gen
v2014.08.15.10

McAfee
PWSZbot-FABW!6763BCAC1B98
5600.7038

Microsoft Security Essentials
Threat.Undefined
1.181.75.0

MicroWorld eScan
Gen:Variant.Kazy.430690
15.0.0.681

NANO AntiVirus
Trojan.Win32.KillProc.ddtlcg
0.28.2.61721

Norman
ZBot.UYZK
11.20140815

Panda Antivirus
Trj/Genetic.gen
14.08.15.10

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14813

Sophos
Troj/Agent-AIIM
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-FalComp
10263

Total Defense
Win32/Zbot.fXWIRPC
37.0.11130

VIPRE Antivirus
Threat.4371328
32210

File size:
299.6 KB (306,819 bytes)

Product version:
1.9.43074.5121

Copyright:
© Maskiseft Corporatien. All rights reserved.

Original file name:
divonv.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\idydore\tofai.exe

File PE Metadata
Compilation timestamp:
3/27/2010 9:51:57 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:edEHBphyq9brO9zMZMg34krdwJgefjISZgb+k:edevQqBwg3ICwYb+k

Entry address:
0xC980

Entry point:
55, 8B, EC, 81, EC, 04, 01, 00, 00, B8, 6D, 00, 00, 00, 89, 85, 2C, FF, FF, FF, 53, 6A, B5, 50, 6A, C9, 50, E8, 21, 1E, 00, 00, 83, C4, 10, 56, 8B, 95, 2C, FF, FF, FF, 89, 95, 2C, FF, FF, FF, 57, 33, D0, 3B, C2, 75, 06, 89, 95, 2C, FF, FF, FF, 8B, B5, 2C, FF, FF, FF, 83, C6, D6, 89, B5, 2C, FF, FF, FF, 6A, 00, 6A, 00, 68, 8E, 00, 00, 00, 68, 98, CA, 42, 00, FF, 15, 2C, 4E, 42, 00, 2D, 00, 48, 80, 2A, 89, 85, 2C, FF, FF, FF, 8D, 85, 44, FF, FF, FF, 50, FF, 15, 34, 4E, 42, 00, 83, F0, 83, 89, 85, 2C, FF, FF...
 
[+]

Entropy:
7.8301

Developed / compiled with:
Microsoft Visual C++

Code size:
138.5 KB (141,824 bytes)

Scheduled Task
Task name:
Security Center Update - 1266998693

Trigger:
Daily (Runs daily at 8:00 AM)

Description:
Keeps your Security Center software up to date. If this task is disabled or stopped, your Security Center software will not be kept up to date, meanin


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to vip-112.lax.adconion.com  (207.171.14.112:443)

TCP (HTTP SSL):
Connects to server-54-230-89-186.ind6.r.cloudfront.net  (54.230.89.186:443)

TCP (HTTP):
Connects to server-205-251-253-200.ind6.r.cloudfront.net  (205.251.253.200:80)

TCP:
Connects to server-204-246-176-39.iad2.r.cloudfront.net  (204.246.176.39:1935)

TCP (HTTP SSL):
Connects to sa.ri3.scorecardresearch.com  (4.26.67.50:443)

TCP (HTTP):
Connects to ord08s09-in-f31.1e100.net  (74.125.225.159:80)

TCP (HTTP):
Connects to ord08s09-in-f28.1e100.net  (74.125.225.156:80)

TCP (HTTP SSL):
Connects to ord08s09-in-f27.1e100.net  (74.125.225.155:443)

TCP (HTTP):
Connects to ord08s07-in-f28.1e100.net  (74.125.225.92:80)

TCP (HTTP SSL):
Connects to ord08s07-in-f27.1e100.net  (74.125.225.91:443)

TCP (HTTP):
Connects to ord08s07-in-f25.1e100.net  (74.125.225.89:80)

TCP (HTTP):
Connects to m-prd-pxl-adcom-mtc.evip.aol.com  (64.12.106.9:80)

TCP (HTTP):
Connects to iad23s26-in-f14.1e100.net  (173.194.121.46:80)

TCP (HTTP):
Connects to iad23s24-in-f7.1e100.net  (74.125.228.231:80)

TCP (HTTP):
Connects to float.680.bm-impbus.prod.nym2.adnexus.net  (68.67.153.105:80)

TCP (HTTP):
Connects to float.478.bm-impbus.prod.nym2.adnexus.net  (68.67.152.233:80)

TCP (HTTP):
Connects to float.2050.bm-impbus.prod.nym2.adnexus.net  (68.67.153.166:80)

TCP (HTTP):
Connects to edge-star-shv-03-frc1.facebook.com  (69.171.247.29:80)

TCP (HTTP):
Connects to ec2-54-243-112-218.compute-1.amazonaws.com  (54.243.112.218:80)

TCP (HTTP SSL):
Connects to ec2-54-235-191-114.compute-1.amazonaws.com  (54.235.191.114:443)

Remove tofai.exe - Powered by Reason Core Security