SHA256: b31c4f30f37be6a0ea904019fcce94319fd59215fe06d52a265946be088d2592 File name: turbo.exe Detection ratio: 48 / 58 Analysis date: 2017-02-20 04:48:47 UTC ( 0 minutes ago ) Cyren W32/Trojan.YHFN-2823 20170220 DrWeb Trojan.PWS.Stealer.15842 20170220 ESET-NOD32 a variant of Win32/Injector.DKFX 20170219 Emsisoft Trojan.GenericKD.4236515 (B) 20170220 F-Secure Trojan.GenericKD.4236515 20170220 Fortinet W32/Injector.DJWH!tr 20170220 GData Trojan.GenericKD.4236515 20170220 Ikarus Trojan.Win32.Injector 20170219 K7AntiVirus Trojan ( 005036d71 ) 20170220 K7GW Trojan ( 005036d71 ) 20170220 Kaspersky Trojan.Win32.Agent.neytzz 20170220 Malwarebytes Trojan.Crypt 20170220 McAfee Trojan-FLBV!22730AE47ACC 20170220 McAfee-GW-Edition Trojan-FLBV!22730AE47ACC 2017-02-18 07:20:52.112791 IP 192.168.1.102.55812 > 182.255.5.201.80: Flags [P.], seq 0:416, ack 1, win 256, length 416: HTTP: GET /~bemkmund/two/turbo.exe HTTP/1.1 E…=.@…<….f…….P0.H..P.0P…k…GET /~bemkmund/two/turbo.exe HTTP/1.1 Accept: application/x-shockwave-flash, image/gif, image/jpeg, image/pjpeg, */* […]