backup_exec_2010_r3_sp1_downloader.exe

Escolade Solutions LTD.

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application backup_exec_2010_r3_sp1_downloader.exe by Escolade Solutions has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The file has been seen being downloaded from www.1-files.com. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Escolade Solutions LTD.  (signed and verified)

Description:
iPumper

Version:
1.0.0.2

MD5:
8dd19c748ae7bf150ff1da1b047b56c1

SHA-1:
a2845a3d711fdf69b31f1f657fdf5d88c3783a32

SHA-256:
dd55a06c9d940f9a4616f76715ca79300deb0013bf09ae9af19f15b4edeb6354

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/15/2024 8:55:11 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcircle (M)
16.8.7.17

File size:
4.7 MB (4,879,304 bytes)

Product version:
0.0.0.0

Original file name:
xyzygZIOH.lnk_p

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\backup_exec_2010_r3_sp1_downloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
9/24/2012 7:00:00 PM

Valid to:
9/25/2013 6:59:59 PM

Subject:
CN=Escolade Solutions LTD., O=Escolade Solutions LTD., STREET=Akademica Vernadskogo blvd. 36-507, L=Kiev, S=Kiev, PostalCode=03451, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0FB283CB6EEA8D0204BFA51C4BCE925C

File PE Metadata
Compilation timestamp:
8/29/2013 3:40:33 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:vR6dhlHPCFVAl8McmEA5pCvoOdJiQ0Ghv+v8oc/A:vIzRCFVurTE9PiQ0A/A

Entry address:
0x43420

Entry point:
E8, D4, 9D, 00, 00, E9, 89, FE, FF, FF, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F, 85, C1, 00, 00, 00, 8B, D1, 83, E1, 7F, C1, EA, 07, 74, 65, EB, 06, 8D, 9B, 00, 00, 00, 00, 66, 0F, 6F, 06, 66, 0F, 6F, 4E, 10, 66, 0F, 6F, 56, 20, 66, 0F, 6F, 5E, 30, 66, 0F, 7F, 07, 66, 0F, 7F, 4F, 10, 66, 0F, 7F, 57, 20, 66, 0F, 7F, 5F, 30, 66, 0F, 6F, 66, 40, 66, 0F, 6F, 6E, 50, 66, 0F, 6F, 76, 60, 66, 0F, 6F, 7E, 70, 66, 0F, 7F, 67, 40, 66, 0F, 7F, 6F, 50, 66, 0F, 7F, 77, 60, 66, 0F, 7F, 7F, 70, 8D, B6, 80, 00, 00, 00, 8D, BF...
 
[+]

Entropy:
6.9179

Code size:
402.5 KB (412,160 bytes)

The file backup_exec_2010_r3_sp1_downloader.exe has been seen being distributed by the following URL.

Remove backup_exec_2010_r3_sp1_downloader.exe - Powered by Reason Core Security