android injector_exe.exe

CNET Download.com Installer

CBS Interactive

The application android injector_exe.exe, “CNET Download.com Install” by CBS Interactive has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the DownloadCom Spot Install installer. The file has been seen being downloaded from fileshare1250.depositfiles.org and multiple other hosts.
Publisher:
CNET Download.com  (signed by CBS Interactive)

Product:
CNET Download.com Installer

Description:
CNET Download.com Install

Version:
v2.0.2.108

MD5:
01b10f6adeae3543c957e86c6724b3ac

SHA-1:
6520ee7ba09de192dd7cc50c8136374fdffd8c84

SHA-256:
1b4ea663eeaa3ce51d4a9aa2c036a3ebf55f345e0b56dc7b68982bd7ec919823

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 3:41:10 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.CBS.CBSInteractive.Bundler (M)
16.2.19.0

File size:
452.2 KB (463,080 bytes)

Product version:
v2.0.2.108

Copyright:
CBS Interactive

File type:
Executable application (Win32 EXE)

Bundler/Installer:
DownloadCom Spot Install

Common path:
C:\users\{user}\downloads\compressed\android injector_exe.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/4/2011 6:00:00 PM

Valid to:
8/4/2013 5:59:59 PM

Subject:
CN=CBS Interactive, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=CBS Interactive, L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
071A760107B4DE793CD48C0EDA1DF0B5

File PE Metadata
Compilation timestamp:
6/19/1992 4:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:oGFP4rsBRjSLvxZqWPo3jTza+YoH34kc9dtjkvi:tJw4iloja+Yp9dtjkvi

Entry address:
0x101660

Entry point:
60, BE, 00, C0, 49, 00, 8D, BE, 00, 50, F6, FF, C7, 87, 10, D7, 0B, 00, E8, 13, 89, FA, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Entropy:
7.8486

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
408 KB (417,792 bytes)

The file android injector_exe.exe has been seen being distributed by the following 4 URLs.

http://fileshare1250.depositfiles.org/auth-1487623575a3bf2722dcc08b1dca3609-186.77.198.145-116049709-132462419-guest/.../Android Injector_exe.exe

http://fileshare1250.depositfiles.org/auth-1434422469f186c72d3a76cedd782d01-186.42.245.159-2129137642-132462419-guest/.../Android Injector_exe.exe

http://fileshare1250.depositfiles.org/auth-1449523327ad6db279d7c3821e434587-187.217.219.56-2384207014-132462419-guest/.../Android Injector_exe.exe

Remove android injector_exe.exe - Powered by Reason Core Security