56f72.exe

LLC

The application 56f72.exe by LLC has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from mso-special.com.
Publisher:
LLC   (signed and verified)

Version:
2.0.2.0

MD5:
a6c80e0d84c1636a66ba5e83063a9155

SHA-1:
3382ff851830ec097fde714628f49db483624f6e

SHA-256:
56a5f73a8af607500e5459771d87a90b550fee8da96b3c44b9f77ec27356a062

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/27/2024 12:49:58 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Amonetize.Bundler.Amonitize.Meta (M)
16.6.13.1

File size:
1.2 MB (1,237,464 bytes)

Product version:
2.0.2.0

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\56f72.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
10/1/2015 3:00:00 AM

Valid to:
10/1/2016 2:59:59 AM

Subject:
CN="LLC ""AZ SOFT""", O="LLC ""AZ SOFT""", STREET="Vulytsya Dalnytska, Budynok 23/4, Ofis 310", L=Odesa, S=Odeska, PostalCode=65005, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3CCA67117AE7C5BE2F99ECBA3ECC9F69

File PE Metadata
Compilation timestamp:
1/18/2016 1:16:41 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:DWglpCVD5aivtBRXMQ/3dx+BSVyihzRAZ4RxSbFm8EfIvN7:DWglKDnR3/RsZsxF8Ef2

Entry address:
0x3B2850

Entry point:
60, BE, 00, A0, 68, 00, 8D, BE, 00, 70, D7, FF, C7, 87, 34, FC, 35, 00, AC, 34, 81, 98, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
1.2 MB (1,216,512 bytes)

The file 56f72.exe has been seen being distributed by the following URL.

Remove 56f72.exe - Powered by Reason Core Security