vroot_1896350208_cid1000_7ba70783.exe

深圳信壹网络有限公司

The application vroot_1896350208_cid1000_7ba70783.exe by 深圳信壹网络有限公司 has been detected as a potentially unwanted program by 11 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from downloader.disk.yandex.ru and multiple other hosts.
Publisher:
深圳信壹网络有限公司   (signed by 深圳信壹网络有限公司)

Version:
1.8.2.13135

MD5:
f0499b8fd1e6a09f17c2ad6c368c45bf

SHA-1:
e63a5659f0e04c60bfff17b748aaf586b933e00d

SHA-256:
efed24028f7b40f86f7da3eec746563b9f2b27bebe06c30c367fda1a1ff3a037

Scanner detections:
11 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 12:05:31 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Android.Hacktool.Mgyun.A
720

Avira AntiVirus
Android/Spy.Agent.GJ.Gen
7.11.210.56

avast!
Android:Agent-FUC [PUP]
2014.9-150214

AVG
Android/Deng
2016.0.3198

ESET NOD32
Android/Spy.Agent.BN (variant)
9.11176

Fortinet FortiGate
Android/Agent.BN!tr.spy
2/14/2015

F-Secure
Android.Hacktool.Mgyun.A
11.2015-14-02_7

K7 AntiVirus
Spyware
13.194.14967

McAfee
Artemis!F0499B8FD1E6
5600.6854

NANO AntiVirus
Trojan.Android.Rooter.daolwi
0.30.0.65070

Trend Micro House Call
Suspicious_GEN.F47V0214
7.2.45

File size:
13.8 MB (14,419,232 bytes)

Product version:
1.8.2.13135

Copyright:
© 2011-2015 Xinyi Inc. All rights reserved.

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\autoupdate\vroot_1896350208_cid1000_7ba70783.exe

Digital Signature
Authority:
WoSign CA Limited

Valid from:
10/8/2014 2:34:44 PM

Valid to:
10/8/2017 2:34:44 PM

Subject:
CN=深圳信壹网络有限公司, E=szxyym@mgyun.com, O=深圳信壹网络有限公司, L=深圳市, S=广东省, C=CN

Issuer:
CN=WoSign Class 3 Code Signing CA, O=WoSign CA Limited, C=CN

Serial number:
69B39EA88C3DBAEBF09D91F5BA0D6E2B

File PE Metadata
Compilation timestamp:
7/9/2014 2:58:13 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
393216:+uleHj5Km6GueXMAmzH2L8o+TQuc5+s+N:9Qj0mfWq/+0u+C

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.9947

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file vroot_1896350208_cid1000_7ba70783.exe has been seen being distributed by the following 8 URLs.

https://downloader.disk.yandex.ru/disk/709db6f922e7e69c3771ea863b5704f857859ff0e898fdf5cb90668eabaa1009/5836a0cf/.../x-msdownload&fsize=14419232&hid=10310e0f0d1606b1020189e27fd67fb6&media_type=executable&tknv=v2

http://androidhost.org/.../PdJP7

https://downloader.disk.yandex.com/disk/cc6809a1c3e5ed9058ade10125eb3735ad11c9b1a9f4f63ad53a575c2568e46a/57f56e47/QKOD7TC6sJMV4uPKZnCjaR9yg0EUsvTCAAl4TVujYHVoA1y_fxSMMN6Reb9SKF18sn7Kxkb2jHFKrnq0Vcdf9A==?uid=0&filename=VRoot v.1.8.2.13135.exe&disposition=attachment&hash= oGwdNT5RlzWgIpV/.../x-msdownload&fsize=14419232&hid=10310e0f0d1606b1020189e27fd67fb6&media_type=executable&tknv=v2

Remove vroot_1896350208_cid1000_7ba70783.exe - Powered by Reason Core Security