yomz.exe

Ding Ruan

The application yomz.exe by Ding Ruan has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-192-29-204.dub2.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Ding Ruan  (signed and verified)

MD5:
2eeea576b3a930fc5bdf58729b1b35db

SHA-1:
5441acc356905438420b7162b3a5bd0f5d0e3a7d

SHA-256:
8d99f11e5fbc2c101df72e3b648e2044cf390ebbf6b7a45f6e38e361b5eb8897

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
5/21/2024 12:11:26 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.ELEX (M)
17.1.25.18

File size:
409.9 KB (419,752 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\yomz.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/17/2017 5:30:00 AM

Valid to:
4/14/2017 5:29:59 AM

Subject:
CN=Ding Ruan, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
703FDC6C80FE51EE4915A03C4CA4B752

File PE Metadata
Compilation timestamp:
1/18/2017 1:28:32 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x2E04

Entry point:
E8, 61, 7A, 00, 00, E9, 19, 94, 00, 00, 6A, 08, 68, F8, 2A, 46, 00, E8, 86, 95, 00, 00, 8B, 45, 08, 85, C0, 74, 72, 81, 38, 63, 73, 6D, E0, 75, 6A, 83, 78, 10, 03, 75, 64, 81, 78, 14, 20, 05, 93, 19, 74, 12, 81, 78, 14, 21, 05, 93, 19, 74, 09, 81, 78, 14, 22, 05, 93, 19, 75, 49, 8B, 48, 1C, 85, C9, 74, 42, 8B, 51, 04, 85, D2, 74, 27, 83, 65, FC, 00, 52, FF, 70, 18, E8, C7, 2B, 00, 00, C7, 45, FC, FE, FF, FF, FF, EB, 25, 33, C0, 38, 45, 0C, 0F, 95, C0, C3, 8B, 65, E8, E8, 06, F4, FF, FF, F6, 01, 10, 74, 0F...
 
[+]

Entropy:
7.8114  (probably packed)

Code size:
364.5 KB (373,248 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-29-68.dub2.r.cloudfront.net  (54.192.29.68:80)

TCP (HTTP):
Connects to server-54-192-29-32.dub2.r.cloudfront.net  (54.192.29.32:80)

TCP (HTTP):
Connects to server-54-192-29-246.dub2.r.cloudfront.net  (54.192.29.246:80)

TCP (HTTP):
Connects to server-54-192-29-226.dub2.r.cloudfront.net  (54.192.29.226:80)

TCP (HTTP):
Connects to server-54-192-29-204.dub2.r.cloudfront.net  (54.192.29.204:80)

TCP (HTTP):
Connects to server-54-192-29-160.dub2.r.cloudfront.net  (54.192.29.160:80)

TCP (HTTP):
Connects to server-54-192-29-113.dub2.r.cloudfront.net  (54.192.29.113:80)

Remove yomz.exe - Powered by Reason Core Security