4acf.tmp

The file 4acf.tmp has been detected as malware by 21 anti-virus scanners. According to AVG, this software downloads additional adware offers during setup. The file has been seen being downloaded from bit.ly and multiple other hosts.
Version:
101.88.99.1256

MD5:
5b446e54f5366285bc5e1ae8a2f459c1

SHA-1:
41825eddce8daf0ee9cfb5bfa947a0f125171205

SHA-256:
5542a254229f9546b6da35ec4a03975612dc8e7965c6e0b32944fea37151e5c8

Scanner detections:
21 / 68

Status:
Malware

Analysis date:
7/8/2025 1:02:02 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2785394
469

Avira AntiVirus
TR/Dldr.Banload.754
8.3.2.2

Arcabit
Trojan.Generic.D2A8072
1.0.0.582

avast!
Win32:Banker-MJB [Trj]
2014.9-151023

AVG
Downloader.Banload2
2016.0.2947

Bitdefender
Trojan.GenericKD.2785394
1.0.20.1480

Emsisoft Anti-Malware
Trojan.GenericKD.2785394
8.15.10.23.02

ESET NOD32
Win32/TrojanDownloader.Banload.WOT
9.12387

Fortinet FortiGate
W32/Banload.WOT!tr.dldr
10/23/2015

F-Secure
Trojan.GenericKD.2785394
11.2015-23-10_6

G Data
Trojan.GenericKD.2785394
15.10.25

IKARUS anti.virus
Trojan-Downloader.Win32.Banload
t3scan.1.9.5.0

K7 AntiVirus
Trojan-Downloader
13.210.17493

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.1232

Malwarebytes
Trojan.Banload.GGL
v2015.10.23.02

McAfee
GenericR-ERC!5B446E54F536
5600.6603

MicroWorld eScan
Trojan.GenericKD.2785394
16.0.0.888

Reason Heuristics
Threat.Win.Reputation.IMP
15.11.19.19

Sophos
Mal/Generic-S
4.98

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
44436

File size:
1.1 MB (1,177,600 bytes)

Product version:
1.0.0.0

Language:
Romeno (Romênia)

Common path:
C:\users\{user}\appdata\local\temp\4acf.tmp

File PE Metadata
Compilation timestamp:
6/19/1992 7:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:Cxl38VsW5AqJru81ldIpTk0S9Cr2cn4eUKOA7UoGMDTU+oHR:CdeldIG0Nr2bkTP6

Entry address:
0xE6540

Entry point:
55, 8B, EC, 83, C4, F0, B8, 00, 60, 4E, 00, E8, 70, 03, F2, FF, 68, D8, 65, 4E, 00, 6A, 00, 6A, 00, E8, CA, 05, F2, FF, E8, 45, 07, F2, FF, 3D, B7, 00, 00, 00, 75, 0C, A1, 84, 04, 4F, 00, 8B, 00, E8, 46, 98, F7, FF, A1, 84, 04, 4F, 00, 8B, 00, E8, B6, 96, F7, FF, 6A, EC, A1, 84, 04, 4F, 00, 8B, 00, 8B, 40, 30, 50, E8, C4, 0E, F2, FF, 0D, 80, 00, 00, 00, 50, 6A, EC, A1, 84, 04, 4F, 00, 8B, 00, 8B, 40, 30, 50, E8, C4, 10, F2, FF, 8B, 0D, F8, 06, 4F, 00, A1, 84, 04, 4F, 00, 8B, 00, 8B, 15, 50, 3F, 4E, 00, E8...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
917.5 KB (939,520 bytes)

The file 4acf.tmp has been seen being distributed by the following 5 URLs.

Remove 4acf.tmp - Powered by Reason Core Security