update.exe

TODO:

TODO: <Company name>

The executable update.exe has been detected as malware by 27 anti-virus scanners. While running, it connects to the Internet address 58x158x177x102.ap58.ftth.ucom.ne.jp on port 80 using the HTTP protocol.
Publisher:
TODO:

Product:
TODO: <Product name>

Description:
Catch

Version:
1.0.0.1

MD5:
d1395d099e4552bc7ac291d855ddb59c

SHA-1:
85e9fdb5d6c634f046e2dd667b0f2939e5fdc3f2

SHA-256:
d2dca9f3a33a375ea8e62bfb10aa32914d900d0c3b49077fd88706f1388c8179

Scanner detections:
27 / 68

Status:
Malware

Analysis date:
4/26/2024 5:33:20 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.144835
815

Agnitum Outpost
Trojan.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Agent
2014.07.14

Avira AntiVirus
TR/Graftor.144835.9
7.11.164.242

avast!
Win32:Dropper-gen [Drp]
2014.9-141112

AVG
Agent4
2015.0.3293

Baidu Antivirus
Trojan.Win32.Agent
4.0.3.141112

Bitdefender
Gen:Variant.Graftor.144835
1.0.20.1580

Comodo Security
UnclassifiedMalware
18849

Emsisoft Anti-Malware
Gen:Variant.Graftor.144835
8.14.11.12.05

ESET NOD32
Win32/Agent.QKU (variant)
8.10089

Fortinet FortiGate
W32/Agent.QKU!tr
12/16/2014

F-Secure
Gen:Variant.Graftor.144835
11.2014-12-11_4

G Data
Gen:Variant.Graftor.144835
14.11.24

IKARUS anti.virus
Trojan.Win32.Agent
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.182.12926

McAfee
Artemis!D1395D099E45
5600.6949

MicroWorld eScan
Gen:Variant.Graftor.144835
15.0.0.948

Norman
Suspicious_Gen5.ASNSO
11.20141216

Qihoo 360 Security
Win32/Trojan.e45
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.12.16.12

Rising Antivirus
PE:Trojan.Win32.Generic.16F3EE16!385084950
23.00.65.141214

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_GEN.R0CBC0EGO14
7.2.350

Trend Micro
TROJ_GEN.R0CBC0EGO14
10.465.16

VIPRE Antivirus
Trojan.Win32.Generic
31238

ViRobot
Trojan.Win32.S.Agent.2514432
2011.4.7.4223

File size:
2.1 MB (2,179,584 bytes)

Product version:
1.0.0.1

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
Catch.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\adobe\10.0\update.exe

File PE Metadata
Compilation timestamp:
3/19/2014 2:59:09 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:l4oJDRzdqxs86N/4TJ42jlrZ/3NRoUw0+LxvY/4BBc9aV8MgcOwTbJqTpY:lRDRzdqxs86q142jP/3NRoUw0wNRV8M5

Entry address:
0x1044AF

Entry point:
E8, F9, A7, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 57, 8B, 7D, 10, 8B, C7, 83, E8, 00, 0F, 84, B7, 14, 00, 00, 48, 0F, 84, 9F, 14, 00, 00, 48, 0F, 84, 6C, 14, 00, 00, 48, 0F, 84, 21, 14, 00, 00, 48, 0F, 84, 99, 13, 00, 00, 8B, 4D, 0C, 8B, 45, 08, 53, 6A, 20, 5A, E9, 32, 04, 00, 00, 8B, 30, 3B, 31, 74, 74, 0F, B6, 30, 0F, B6, 19, 2B, F3, 74, 13, 33, DB, 85, F6, 0F, 9F, C3, 8D, 74, 1B, FF, 85, F6, 0F, 85, 2B, 04, 00, 00, 0F, B6, 70, 01, 0F, B6, 59, 01, 2B, F3, 74, 13, 33, DB, 85, F6, 0F, 9F, C3...
 
[+]

Entropy:
6.4942

Code size:
1.2 MB (1,212,416 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to 58x158x177x102.ap58.ftth.ucom.ne.jp  (58.158.177.102:80)

Remove update.exe - Powered by Reason Core Security