bnd_tgu_457_201554_1450.exe

Navigation

Wang Nan

The application bnd_tgu_457_201554_1450.exe by Wang Nan has been detected as adware by 11 anti-malware scanners. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from d5qlpohh1zul3.cloudfront.net.
Publisher:
Navigation Co., Ltd.  (signed by Wang Nan)

Product:
Navigation

Version:
2.3.0.8956

MD5:
a46dc2520eface4a77246d65e054df2d

SHA-1:
bf85886add85c82a1bf97b7c26f873720c0f2497

SHA-256:
fc7e37c88c791deaeadea6c8ce91a204225a6eb5bde57b415fb3cc51e998e490

Scanner detections:
11 / 68

Status:
Adware

Analysis date:
2/25/2025 6:13:10 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Adware-gen [Adw]
2014.9-150516

Baidu Antivirus
Adware.Win32.Navegaki
4.0.3.15516

ESET NOD32
Win32/Adware.Navegaki.AB (variant)
9.11597

Fortinet FortiGate
Riskware/Navegaki
5/16/2015

G Data
Win32.Application.Agent.TMAA59
15.5.25

IKARUS anti.virus
AdWare.Navegaki
t3scan.1.8.9.0

K7 AntiVirus
Adware
13.203.15849

McAfee
Artemis!A46DC2520EFA
5600.6763

Reason Heuristics
Threat.WangNan
15.5.16.19

Trend Micro House Call
Suspicious_GEN.F47V0501
7.2.136

VIPRE Antivirus
Trojan.Win32.Generic
40062

File size:
423.5 KB (433,704 bytes)

Product version:
2.3.0.8956

Copyright:
Navigation Copyright (C) 2013

Original file name:
Navigation.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\bnd_tgu_457_201554_1450.exe

Digital Signature
Signed by:

Authority:
WoSign CA Limited

Valid from:
7/22/2014 1:49:09 AM

Valid to:
7/22/2015 1:49:09 AM

Subject:
CN=Wang Nan, E=wangnan@oasgames.com, L=Luquan, S=Hebei, C=CN

Issuer:
CN=WoSign Class 2 Code Signing CA, O=WoSign CA Limited, C=CN

Serial number:
2D2175D57FAB801CD9A1A92DE079F0EA

File PE Metadata
Compilation timestamp:
4/29/2015 4:48:57 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:12s/If90Q9JLTGeO6tqwfmCdyJTiseH0AydGLyGk/r12:13U90Q9VBO6tqwfzC+sWSGuGk/r12

Entry address:
0x2663F

Entry point:
E8, CE, DD, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 74, 10, 8B, 55, 0C, 85, D2, 74, 09, 8B, 4D, 10, 85, C9, 75, 16, 88, 0E, E8, D5, 24, 00, 00, 6A, 16, 5E, 89, 30, E8, A0, 6F, 00, 00, 8B, C6, 5E, 5D, C3, 57, 8B, FE, 2B, F9, 8A, 01, 88, 04, 0F, 41, 84, C0, 74, 03, 4A, 75, F3, 5F, 85, D2, 75, 0B, 88, 16, E8, A8, 24, 00, 00, 6A, 22, EB, D1, 33, C0, EB, D7, 55, 8B, EC, 56, 57, 8B, 7D, 08, 85, FF, 74, 11, 8B, 4D, 0C, 85, C9, 74, 0A, 8B, 75, 10, 85, F6, 75, 18, C6, 07, 00, E8, 7E, 24, 00...
 
[+]

Entropy:
6.5079

Code size:
253 KB (259,072 bytes)

The file bnd_tgu_457_201554_1450.exe has been seen being distributed by the following URL.

Remove bnd_tgu_457_201554_1450.exe - Powered by Reason Core Security