air2391.exe

PlumoWeb

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application air2391.exe by PlumoWeb has been detected as adware by 20 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from cdn.airdlr9.com.
Publisher:
PlumoWeb  (signed and verified)

MD5:
88f0fb1c352231b2003b97b792d2053d

SHA-1:
0276270f6d7a2fab471a2e32ff452dbd0ceb5632

SHA-256:
318a9e8beb6661c0ad397f04996334c3d3663ddf0481fa61663d16837c644f5e

Scanner detections:
20 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
12/24/2024 4:26:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CQ
6100378

Avira AntiVirus
Adware/BrowseFox.apq
7.11.193.68

avast!
BrowseFox-D [PUP]
141130-1

AVG
Generic
2015.0.3268

Baidu Antivirus
Adware.Win64.BrowseFox
4.0.3.14126

Bitdefender
Adware.SwiftBrowse.CQ
1.0.20.1700

Clam AntiVirus
Win.Adware.Swiftbrowse-818
0.98/19741

Dr.Web
Trojan.Yontoo.97
9.0.1.05190

Emsisoft Anti-Malware
Adware.SwiftBrowse.CQ
9.0.0.4668

ESET NOD32
Win64/BrowseFox.BM potentially unwanted application
7.0.302.0

F-Secure
Adware.SwiftBrowse.CQ
11.2014-06-12_7

G Data
Adware.SwiftBrowse.CQ
14.12.24

Malwarebytes
PUP.Optional.BPlug
v2014.12.06.08

MicroWorld eScan
Adware.SwiftBrowse.CQ
15.0.0.1020

NANO AntiVirus
Trojan.Win32.BPlug.dfsehz
0.28.6.63850

Norman
Adware.SwiftBrowse.CQ
04.12.2014 14:30:06

nProtect
Adware.SwiftBrowse.CQ
14.12.05.01

Reason Heuristics
PUP.PlumoWeb.H
14.12.6.20

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.141204

VIPRE Antivirus
Threat.4150696
35418

File size:
569.6 KB (583,240 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\air2391.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/5/2014 1:00:00 AM

Valid to:
8/6/2015 12:59:59 AM

Subject:
CN=PlumoWeb, O=PlumoWeb, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
792D14E276E932D00A4F272C4ED5B70E

File PE Metadata
Compilation timestamp:
12/5/2009 10:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:iG5Z396mOLG1s15Ap/G/8/3D0Fw/tN8dkmLtpHHHrh76oP4NA+P/:ii399OLG6j8/z0FmcLbH16oQR

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9814

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file air2391.exe has been seen being distributed by the following URL.

Remove air2391.exe - Powered by Reason Core Security