adobe_flashplayer.exe

Installer

OOO Kod Intertainment

The application adobe_flashplayer.exe by OOO Kod Intertainment has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from readynewsoft.set2newupdate.website. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
OOO Kod Intertainment  (signed and verified)

Product:
Installer

Version:
1.0.0.0

MD5:
3321d7978f6658ac69c4cee97ef9cc2c

SHA-1:
aecc54a3c25294ec80967985f8b0df1dba908a12

SHA-256:
258de64ead02525f315b6a26de9454c60fa1a920d31f071e15b759302832bf78

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
12/27/2024 6:43:03 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.OOOKodIn.Installer (M)
16.5.8.8

File size:
667.7 KB (683,712 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
Installer.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\adobe_flashplayer.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
5/19/2015 7:00:00 PM

Valid to:
5/19/2016 6:59:59 PM

Subject:
CN=OOO Kod Intertainment, OU=Application Pool Insert, O=OOO Kod Intertainment, STREET="per. Sukharevski M., d. 9 str. 1 of. 36", L=Moscow, S=Moscow, PostalCode=127051, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009A10FA4B08D8CB4B3B790B1C419EB7B3

File PE Metadata
Compilation timestamp:
5/5/2016 3:07:13 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:Y+1PR5ltbn3HL0xgyKivPEPwDPdOMKXJLjEPOTzASfOcba1PT6+6AlMVQ06CYq:Xb3j34VKiCodLq

Entry address:
0xA4E0E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.0218

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
652 KB (667,648 bytes)

The file adobe_flashplayer.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

TCP (HTTP):

Remove adobe_flashplayer.exe - Powered by Reason Core Security