1442242222.exe

BeST ApP

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application 1442242222.exe by BeST ApP has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from get.up1004.info.
Publisher:
UYOKM  (signed by BeST ApP)

Product:
UYOKM

Version:
3075.15914.881.2587

MD5:
a2871b528ca06e616699e53e2a8ee222

SHA-1:
90eaf30927722956e8101dec23403615e672173b

SHA-256:
f9f2f9a493c8258d452cce707b2b63f136d020270ca5ff4f206af657f79ca477

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 12:21:14 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse.BeSTApP.Bundler (M)
16.2.22.13

File size:
557.3 KB (570,720 bytes)

Product version:
3075.15914.881.2587

Copyright:
UYOKM

Trademarks:
UYOKM

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\1442242222.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
6/29/2015 5:00:00 PM

Valid to:
12/17/2015 3:59:59 PM

Subject:
CN=BeST ApP, O=BeST ApP, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
64E1250DF629BD3901AA90A77D70239E

File PE Metadata
Compilation timestamp:
12/5/2009 2:52:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:C5JeEgQ1js6GucLoYA/Oh1ecnSkbRStQ0BmwVaoC/cDjR:CJ1js6GucLBAWacnSS0BmwVad/cDjR

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.8508

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file 1442242222.exe has been seen being distributed by the following URL.

Remove 1442242222.exe - Powered by Reason Core Security