winsaber.exe

Dening Hu

The application winsaber.exe by Dening Hu has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “winsaber”. While running, it connects to the Internet address server-54-230-96-139.arn1.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Dening Hu  (signed and verified)

MD5:
223de46f3f542bb6c0a2e528709ed3c9

SHA-1:
a4861013b9192392c7fbec99e29b665bcd6841e6

SHA-256:
6ae27e3e9809ebc12cb79fc849ed03ea2a9b9e96c66cc3550c144ccb7905bfc8

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/23/2024 6:51:40 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Elex (M)
16.8.1.9

File size:
506.2 KB (518,360 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\winsaber\winsaber.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
6/26/2016 5:00:00 PM

Valid to:
6/8/2017 4:59:59 PM

Subject:
CN=Dening Hu, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
103042E2534359ABAC3B375E85A962BA

File PE Metadata
Compilation timestamp:
7/7/2016 6:53:49 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:cKGOhiVEoRkIW2lWIKEJ+IR9Ny6X45onY15aMdC9gGX7F:cKGOhihnlIlIR9Ny6X411UTgGX7F

Entry address:
0x362D2

Entry point:
E8, A7, AC, 00, 00, E9, 7F, FE, FF, FF, E8, 56, 45, 00, 00, 85, C0, 75, 06, B8, A4, E4, 46, 00, C3, 83, C0, 0C, C3, 55, 8B, EC, 56, E8, E4, FF, FF, FF, 8B, 4D, 08, 51, 89, 08, E8, 20, 00, 00, 00, 59, 8B, F0, E8, 05, 00, 00, 00, 89, 30, 5E, 5D, C3, E8, 22, 45, 00, 00, 85, C0, 75, 06, B8, A0, E4, 46, 00, C3, 83, C0, 08, C3, 55, 8B, EC, 8B, 4D, 08, 33, C0, 3B, 0C, C5, 38, E3, 46, 00, 74, 27, 40, 83, F8, 2D, 72, F1, 8D, 41, ED, 83, F8, 11, 77, 05, 6A, 0D, 58, 5D, C3, 8D, 81, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8...
 
[+]

Entropy:
6.1714

Code size:
363.5 KB (372,224 bytes)

Service
Display name:
winsaber

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-239-132-102.sfo9.r.cloudfront.net  (54.239.132.102:80)

TCP (HTTP):
Connects to server-54-192-98-171.arn1.r.cloudfront.net  (54.192.98.171:80)

TCP (HTTP):
Connects to server-54-192-14-221.ams1.r.cloudfront.net  (54.192.14.221:80)

TCP (HTTP):
Connects to server-54-192-14-138.ams1.r.cloudfront.net  (54.192.14.138:80)

TCP (HTTP):
Connects to server-54-230-95-51.fra2.r.cloudfront.net  (54.230.95.51:80)

TCP (HTTP):
Connects to server-54-192-98-52.arn1.r.cloudfront.net  (54.192.98.52:80)

TCP (HTTP):
Connects to server-54-230-141-248.sfo5.r.cloudfront.net  (54.230.141.248:80)

TCP (HTTP):
Connects to server-54-192-14-91.ams1.r.cloudfront.net  (54.192.14.91:80)

TCP (HTTP):
Connects to server-54-192-14-80.ams1.r.cloudfront.net  (54.192.14.80:80)

TCP (HTTP):
Connects to server-52-85-77-174.lax3.r.cloudfront.net  (52.85.77.174:80)

TCP (HTTP):
Connects to server-54-239-132-139.sfo9.r.cloudfront.net  (54.239.132.139:80)

TCP (HTTP):
Connects to server-54-230-81-101.mia50.r.cloudfront.net  (54.230.81.101:80)

TCP (HTTP):
Connects to server-54-239-132-14.sfo9.r.cloudfront.net  (54.239.132.14:80)

TCP (HTTP):
Connects to server-54-230-141-65.sfo5.r.cloudfront.net  (54.230.141.65:80)

TCP (HTTP):
Connects to server-54-239-132-224.sfo9.r.cloudfront.net  (54.239.132.224:80)

TCP (HTTP):
Connects to server-54-230-81-78.mia50.r.cloudfront.net  (54.230.81.78:80)

TCP (HTTP):
Connects to server-54-230-81-22.mia50.r.cloudfront.net  (54.230.81.22:80)

TCP (HTTP):
Connects to server-54-230-216-83.mrs50.r.cloudfront.net  (54.230.216.83:80)

TCP (HTTP):
Connects to server-54-230-216-228.mrs50.r.cloudfront.net  (54.230.216.228:80)

TCP (HTTP):
Connects to server-54-230-141-242.sfo5.r.cloudfront.net  (54.230.141.242:80)

Remove winsaber.exe - Powered by Reason Core Security