andy_27_v1.exe

ANDY OS

Search Safer Inc

The application andy_27_v1.exe by Search Safer Inc has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from download1521.mediafire.com and multiple other hosts. While running, it connects to the Internet address server-52-85-63-92.lhr50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
andyroid.net  (signed by Search Safer Inc)

Product:
ANDY OS

Description:
ANDY setup

Version:
1.1

MD5:
b832739bfd43d3a0bd4d7d930ce8452c

SHA-1:
a4a6f228ea3b7ea503d2a327d2d6f20e045dea48

SHA-256:
43659852c7dd8a721618876d65fb70bc271a8cd77362e40b24fa21c5a7e7c285

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/26/2024 2:16:59 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Installer.SearchSafer.K
14.7.27.14

File size:
287.4 KB (294,304 bytes)

Copyright:
© andyroid.net (ANDY_BL_Standard_ANDY)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\andy_27_v1.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/6/2014 2:00:00 AM

Valid to:
6/7/2015 1:59:59 AM

Subject:
CN=Search Safer Inc, OU=Search Safer Inc, O=Search Safer Inc, STREET=665 3rd street Suite 150, L=San Francisco, S=California, PostalCode=94107, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E26E98DAA7AAA5703565127BF095EFBE

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:06 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:1Su7ptGNRYCNWEYEwdV8f+Y+FMUexq37+TQd5+LQQ3zTHmdC40Kvfq:F7ptGhYP0CMUQq3ujzTHmdz0KHq

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 6F, 44, 00, E8, 09, 2C, 00, 00, A3, A4, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 2E, 44, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file andy_27_v1.exe has been seen being distributed by the following 3 URLs.

http://download1521.mediafire.com/2xw6adkaaivg/.../Andy_27_v1.exe

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to server-52-85-63-92.lhr50.r.cloudfront.net  (52.85.63.92:80)

Remove andy_27_v1.exe - Powered by Reason Core Security