1.exe

Cucumber Plugin

Smart Konsalting, TOV

The application 1.exe by Smart Konsalting, TOV has been detected as a potentially unwanted program by 5 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from 424918.superfastdownload000.site.
Publisher:
Cucumber Veg  (signed by Smart Konsalting, TOV)

Product:
Cucumber Plugin

Description:
Cucumber Veg

Version:
12.0.7.1

MD5:
ac73a7b8bf1db3650c92d6b20dbe3628

SHA-1:
5dff7180c99286ac76d01aaa89229c2bb4b1be2c

SHA-256:
123fd6f95e5963ac703f114b23cb9b6cf754a6152d27fb2cf2a2095572a33fb9

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
12/22/2024 8:35:28 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Malware-gen
160518-2

Emsisoft Anti-Malware
Gen:Variant.Adware.Strictor.109650
16.07.04

ESET NOD32
Win32/Amonetize.VF potentially unwanted application
8.0.319.0

F-Secure
Variant.Adware.Strictor
5.15.96

Reason Heuristics
PUP.Amonetize.SmartKon (M)
16.7.4.3

File size:
666.7 KB (682,720 bytes)

Product version:
12.0.7.1

Original file name:
potato.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\1.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/13/2016 12:00:00 AM

Valid to:
6/13/2017 11:59:59 PM

Subject:
CN="Smart Konsalting, TOV", OU=IT, O="Smart Konsalting, TOV", STREET="Vulytsya Popudrenka, Budynok 52, Ofis 3", L=Kiev, S=Kiev, PostalCode=02094, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
04AA811AA1CF303C0F4912CFC640AD91

File PE Metadata
Compilation timestamp:
7/3/2016 12:08:03 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:1vTI6GEjgu4+Rk02pwKsR+0/jFygoY7oQbbtxHCgDE1AMDK7q5b/a:17IpjARxSwKsRNyg97oQbzHCgKlCq5za

Entry address:
0xBF93

Entry point:
E8, 26, 2B, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, A1, 40, 24, 43, 00, 85, C0, 75, 1D, E8, 63, 22, 00, 00, 6A, 1E, E8, B9, 22, 00, 00, 68, FF, 00, 00, 00, E8, 24, 12, 00, 00, A1, 40, 24, 43, 00, 59, 59, 8B, 4D, 08, 85, C9, 75, 01, 41, 51, 6A, 00, 50, FF, 15, A0, 70, 42, 00, 5D, C3, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 40, 24, 43, 00, 85, C0, 75, 1D, E8, 1B, 22, 00, 00, 6A, 1E, E8, 71, 22, 00, 00, 68, FF, 00, 00, 00, E8, DC, 11, 00, 00, A1, 40, 24, 43, 00, 59, 59, 85, F6, 74, 04, 8B...
 
[+]

Entropy:
7.3953

Code size:
150 KB (153,600 bytes)

The file 1.exe has been seen being distributed by the following URL.

Remove 1.exe - Powered by Reason Core Security