trojan.exe

.netshrink

PELock Software

The executable trojan.exe, “.netshrink exe compressor loader” has been detected as malware by 1 anti-virus scanner. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘5cd8f17f4086744065eb0992a09e05a2’. While running, it connects to the Internet address 58x158x177x102.ap58.ftth.ucom.ne.jp on port 1177.
Publisher:
PELock Software

Product:
.netshrink

Description:
.netshrink exe compressor loader

Version:
1.0.0.0

MD5:
bd5202a77b708c0b594e06c9752b369c

SHA-1:
7625a32e6f2674f8a35c56001e68d1750e46d0a2

SHA-256:
0ddf31ff485677ab251c6a5fb4d961068887e1398840644573baeb6a7a494285

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
4/19/2024 1:04:52 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Trojan.Startup (M)
16.9.24.7

File size:
149.5 KB (153,088 bytes)

Product version:
1.0.0.0

Copyright:
Copyright Bartosz Wójcik © 2010 www.pelock.com

Original file name:
stub_2.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\trojan.exe

File PE Metadata
Compilation timestamp:
6/29/2013 6:30:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
3072:+s0avymRa3MrnnA5M9ozFuHE590p+SoLDABhEF7DSmTWhlOwakeB:+s06ymRdLnA5M6TX0pdoLDABhEV+UWh8

Entry address:
0x1A1EE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, 00, 03, 00, 00, 00, 30, 00, 00, 80, 0E, 00, 00, 00, 70, 00, 00, 80, 10, 00, 00, 00, B0, 00, 00, 80, 18, 00, 00, 00, F0, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 32, 00, 00, 00, 48, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 60, 00, 00, 00, 44, C1, 01, 00, 28, C8, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.3154

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
96.5 KB (98,816 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
5cd8f17f4086744065eb0992a09e05a2

Command:
"C:\users\{user}\appdata\local\temp\trojan.exe"..


The executing file has been seen to make the following network communication in live environments.

TCP:
Connects to 58x158x177x102.ap58.ftth.ucom.ne.jp  (58.158.177.102:1177)

Remove trojan.exe - Powered by Reason Core Security