adobe_flashplayer.exe

Installer

OOO Kod Intertainment

The application adobe_flashplayer.exe by OOO Kod Intertainment has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from downgradepc.video4updating.tech. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
OOO Kod Intertainment  (signed and verified)

Product:
Installer

Version:
1.0.0.0

MD5:
81d6b8c304bbc879f37a101b9524c8a3

SHA-1:
3c09883a10b9a84d4d2c10208a5001c5918f8aa0

SHA-256:
cbc6b97557718797dfd06b41dd3f2163248effd22e23fceb15b0765266232ead

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
12/29/2024 1:44:33 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.OOOKodIn.Installer (M)
16.5.14.10

File size:
667.2 KB (683,200 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
Installer.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\adobe_flashplayer.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
5/19/2015 5:00:00 PM

Valid to:
5/19/2016 4:59:59 PM

Subject:
CN=OOO Kod Intertainment, OU=Application Pool Insert, O=OOO Kod Intertainment, STREET="per. Sukharevski M., d. 9 str. 1 of. 36", L=Moscow, S=Moscow, PostalCode=127051, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009A10FA4B08D8CB4B3B790B1C419EB7B3

File PE Metadata
Compilation timestamp:
5/5/2016 1:07:13 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:K+S12EFS31uJolMpVP+Eb0LsglJOonVH4j2m28mxZOS18Pc3vf0wivq07dwZrRvm:K+S1tFouJ/F+rP4

Entry address:
0xA4CDE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.0202

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
651.5 KB (667,136 bytes)

The file adobe_flashplayer.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

TCP (HTTP):

Remove adobe_flashplayer.exe - Powered by Reason Core Security