adobe_flashplayer.exe

Installer

OOO Kod Intertainment

The application adobe_flashplayer.exe by OOO Kod Intertainment has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from nowupgrade24.safeupgrades4ever.website. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
OOO Kod Intertainment  (signed and verified)

Product:
Installer

Version:
1.0.0.0

MD5:
88a691b4b93cbb0001e85c3c9cffe5e8

SHA-1:
e7d42978c44f686332c75095542ebaadadcb0759

SHA-256:
f198aa9c07bc74e0f01345e883c6c165604ebb74c15dac1ae7e2d81a09c72620

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
11/25/2024 5:31:22 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.OOOKodIn.Installer (M)
16.5.7.5

File size:
669.2 KB (685,248 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
Installer.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\adobe_flashplayer.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
5/19/2015 8:00:00 PM

Valid to:
5/19/2016 7:59:59 PM

Subject:
CN=OOO Kod Intertainment, OU=Application Pool Insert, O=OOO Kod Intertainment, STREET="per. Sukharevski M., d. 9 str. 1 of. 36", L=Moscow, S=Moscow, PostalCode=127051, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009A10FA4B08D8CB4B3B790B1C419EB7B3

File PE Metadata
Compilation timestamp:
5/5/2016 4:07:13 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:t65ncZuX1QKxUFB0oJ+SeE/ygmrZlZsPaayzGO1/KJbiDfgJZRln/jC657aOxRRb:t2cYqXgoJFOZli+Fm

Entry address:
0xA558E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.0230

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
653.5 KB (669,184 bytes)

The file adobe_flashplayer.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

Remove adobe_flashplayer.exe - Powered by Reason Core Security