yomz.exe

Tianjing Cheng

The executable yomz.exe has been detected as malware by 1 anti-virus scanner. This is a setup program which is used to install the application. The file has been seen being downloaded from dgkytklfjrqkb.cloudfront.net. While running, it connects to the Internet address server-52-84-230-61.sfo9.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Tianjing Cheng  (signed and verified)

MD5:
41b8e674f39644d8962bcb14adcd1a3f

SHA-1:
f38f4184a87edf146af94759cac132eb664ccaba

SHA-256:
d7862d0ba86fd32e09874451f5f0b85d825a95f0e1a43289327c35b7367f40e1

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
7/7/2025 6:59:14 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Win.Reputation (M)
17.1.31.21

File size:
422.5 KB (432,632 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\yomz.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
1/20/2017 3:00:00 AM

Valid to:
7/13/2017 2:59:59 AM

Subject:
CN=Tianjing Cheng, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
1F96016D1BE852B49F3A66ACEAF146B0

File PE Metadata
Compilation timestamp:
1/19/2017 3:36:02 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0x4526

Entry point:
E8, D5, 33, 00, 00, E9, 51, A1, 00, 00, 6A, 08, 68, 28, 5B, 46, 00, E8, D4, AB, 00, 00, FF, 35, 90, 91, 46, 00, FF, 15, 24, 00, 46, 00, 85, C0, 74, 16, 83, 65, FC, 00, FF, D0, EB, 07, 33, C0, 40, C3, 8B, 65, E8, C7, 45, FC, FE, FF, FF, FF, E8, 6E, 00, 00, 00, CC, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 74, 10, 8B, 55, 0C, 85, D2, 74, 09, 8B, 4D, 10, 85, C9, 75, 16, 88, 0E, E8, 99, 46, 00, 00, 6A, 16, 5E, 89, 30, E8, C9, 44, 00, 00, 8B, C6, 5E, 5D, C3, 57, 8B, FE, 2B, F9, 8A, 01, 88, 04, 0F, 41, 84, C0, 74, 03...
 
[+]

Entropy:
7.8024  (probably packed)

Code size:
377 KB (386,048 bytes)

The file yomz.exe has been seen being distributed by the following URL.

http://dgkytklfjrqkb.cloudfront.net/.../yomz.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-84-230-73.sfo9.r.cloudfront.net  (52.84.230.73:80)

TCP (HTTP):
Connects to server-54-192-203-227.fra50.r.cloudfront.net  (54.192.203.227:80)

TCP (HTTP):
Connects to server-52-85-63-71.lhr50.r.cloudfront.net  (52.85.63.71:80)

TCP (HTTP):
Connects to server-52-85-63-243.lhr50.r.cloudfront.net  (52.85.63.243:80)

TCP (HTTP):
Connects to server-52-85-63-194.lhr50.r.cloudfront.net  (52.85.63.194:80)

TCP (HTTP):
Connects to server-52-85-63-151.lhr50.r.cloudfront.net  (52.85.63.151:80)

TCP (HTTP):
Connects to server-52-85-63-148.lhr50.r.cloudfront.net  (52.85.63.148:80)

TCP (HTTP):
Connects to server-52-84-230-61.sfo9.r.cloudfront.net  (52.84.230.61:80)

TCP (HTTP):
Connects to server-52-84-230-132.sfo9.r.cloudfront.net  (52.84.230.132:80)

Remove yomz.exe - Powered by Reason Core Security