vhost.exe

windows

The executable vhost.exe has been detected as malware by 16 anti-virus scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Win32StartSs’. While running, it connects to the Internet address full-cdn-01.cluster010.ovh.net on port 80 using the HTTP protocol.
Product:
windows

Version:
1.0.0.0

MD5:
186a053c071e6e15bfc9befee585184b

SHA-1:
f7ed243201b668f58b437a12cf18e465d7573338

SHA-256:
25e25a0e77d4227499acbcc2121e67f9b545cd1b6694da13929314a78eaea08b

Scanner detections:
16 / 68

Status:
Malware

Analysis date:
4/24/2024 2:32:42 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Heur.MSIL.Krypt.88
825

AegisLab AV Signature
DangerousObject.Multi.Gen
2.1.4+

Bitdefender
Gen:Heur.MSIL.Krypt.88
1.0.20.1525

Emsisoft Anti-Malware
Gen:Heur.MSIL.Krypt.88
8.14.11.01.12

F-Secure
Gen:Heur.MSIL.Krypt.88
11.2014-01-11_7

G Data
Gen:Heur.MSIL.Krypt.88
14.11.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.7.8.0

K7 AntiVirus
Riskware
13.183.13642

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.3012

McAfee
Artemis!186A053C071E
5600.6959

MicroWorld eScan
Gen:Heur.MSIL.Krypt.88
15.0.0.915

Norman
Suspicious_Gen2.VXXVY
11.20141101

Qihoo 360 Security
Win32/Trojan.Multi.daf
1.0.0.1015

Sophos
Mal/DotNet-C
4.98

Trend Micro
TROJ_GEN.R047C0OHG14
10.465.01

VIPRE Antivirus
Trojan.Win32.Generic
33854

File size:
17 KB (17,408 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2013

Original file name:
VoteMeAndFuckYou.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\windows\vhost.exe

File PE Metadata
Compilation timestamp:
7/20/2014 3:52:15 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:fV+9+SwnHZefDXN4V521ueXsDv/XwkawhH+PBwqgwqH5wqlwfswqDwqBykfpWwf7:NHefDn1ueO+yE8

Entry address:
0x58A8

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
14.5 KB (14,848 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Win32StartSs

Command:
C:\windows\vhost.exe


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to full-cdn-01.cluster010.ovh.net  (213.186.33.107:80)

Remove vhost.exe - Powered by Reason Core Security