24 hours after - hiroshiima.mp4.exe

The application 24 hours after - hiroshiima.mp4.exe has been detected as a potentially unwanted program by 24 anti-malware scanners. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. The file has been seen being downloaded from masternal.com.
MD5:
a0aa337ce7851980e8bb97e67be4e4f5

SHA-1:
3e629f31fb41ead2e0dbc2457fe8b086dd64219b

SHA-256:
890d97ed3028350d5d34a864f23ee657f18142eca3744fb7e6a3c134e901dee9

Scanner detections:
24 / 68

Status:
Potentially unwanted

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
11/15/2024 5:06:19 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.552220
6210226

AhnLab V3 Security
PUP/Win32.MultiPlug
2015.04.02

Avira AntiVirus
ADWARE/MultiPlug.Gen7
3.6.1.96

avast!
Win32:MultiPlug-VS [PUP]
150319-0

AVG
Adware Generic6.OUJ
2014.0.4311

Bitdefender
Gen:Variant.Adware.Kazy.552220
1.0.20.455

Bkav FE
HW32.Packed
1.3.0.6379

Dr.Web
Trojan.Crossrider.36840
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.552220
9.0.0.4799

ESET NOD32
Win32/Adware.MultiPlug.ES application
7.0.302.0

Fortinet FortiGate
Riskware/MultiPlug
4/1/2015

F-Prot
W32/S-42f8a357
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy
5.13.68

G Data
Gen:Variant.Adware.Kazy.552220
15.4.25

K7 AntiVirus
Unwanted-Program
13.202.15452

Malwarebytes
PUP.Optional.MultiPlug.A
v2015.04.01.05

McAfee
Program.MultiPlug-FVQ
16.8.708.2

MicroWorld eScan
Gen:Variant.Adware.Kazy.552220
16.0.0.273

NANO AntiVirus
Riskware.Win32.MultiPlug.dnystf
0.30.8.659

Reason Heuristics
Threat.Win.Reputation.IMP
15.4.1.17

Rising Antivirus
PE:Malware.XPACK-HIE/Heur!1.9C48
23.00.65.15330

Sophos
MultiPlug
4.98

Vba32 AntiVirus
suspected of Heur.Malware-Cryptor.Multiplug
3.12.26.3

File size:
1.1 MB (1,111,552 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\24 hours after - hiroshiima.mp4.exe

File PE Metadata
Compilation timestamp:
1/6/2013 8:00:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:e1TtL4NFdFxFuHdcAx/YoVYXyAHhh6GIXyxFMAlueAe9:e1TtLiFdn0NI6XiJlueB

Entry address:
0xB5269

Entry point:
E8, FE, 13, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, A0, AD, 4F, 00, E8, 11, 19, 00, 00, E8, CB, 15, 00, 00, 0F, B7, F0, 6A, 02, E8, 91, 13, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 40, 03, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.4375

Code size:
745 KB (762,880 bytes)

The file 24 hours after - hiroshiima.mp4.exe has been seen being distributed by the following URL.

Remove 24 hours after - hiroshiima.mp4.exe - Powered by Reason Core Security