browzarblack1400.exe

Browzar

Browzar Limited

The application browzarblack1400.exe, “Browzar Private Web Browser” by Browzar Limited has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address smtp.quba.co.uk on port 80 using the HTTP protocol.
Publisher:
Browzar Ltd.  (signed by Browzar Limited)

Product:
Browzar

Description:
Browzar Private Web Browser

Version:
1, 4, 0, 0

MD5:
77f2c5f976e7dbf980ed9e89173a65da

SHA-1:
ca5ee13bf209bf175f2977374ab2a9fd746cd330

SHA-256:
c446de94562db7a431558f409856caef778854d7c08af6d84cbd8300d76fbe76

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/27/2024 7:41:30 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Browzar (M)
16.4.1.14

File size:
219.2 KB (224,472 bytes)

Product version:
1, 4, 0, 0

Copyright:
© Copyright 2006, 2007 Browzar Ltd.

Original file name:
Browzar.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\browzarblack1400.exe

Digital Signature
Signed by:

Authority:
The USERTRUST Network

Valid from:
7/19/2007 9:00:00 PM

Valid to:
7/19/2008 8:59:59 PM

Subject:
CN=Browzar Limited, O=Browzar Limited, STREET=18 Wheathouse Road, L=Huddersfield, S=West Yorkshire, PostalCode=HD2 2UW, C=GB

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
0093A871B5568CA9C6FDC1D70207076E74

File PE Metadata
Compilation timestamp:
8/7/2007 10:22:58 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:EMW+nFfy7iRjt/1XLgcPSwf2zqDpmUZfu4uU+2+iNyJdJN544R0:Ej+FqiRR/1XLguDf2qDBLFi93JQj

Entry address:
0x9E030

Entry point:
60, BE, 00, F0, 46, 00, 8D, BE, 00, 20, F9, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA

Code size:
192 KB (196,608 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to smtp.quba.co.uk  (134.213.173.254:80)

TCP (HTTP):
Connects to c937e9e1.virtua.com.br  (201.55.233.225:80)

TCP (HTTP):
Connects to c937e96d.virtua.com.br  (201.55.233.109:80)

TCP (HTTP):
Connects to c937e967.virtua.com.br  (201.55.233.103:80)

TCP (HTTP):
Connects to c937e9d0.virtua.com.br  (201.55.233.208:80)

TCP (HTTP):
Connects to c937e95f.virtua.com.br  (201.55.233.95:80)

TCP (HTTP):
Connects to c937e952.virtua.com.br  (201.55.233.82:80)

Remove browzarblack1400.exe - Powered by Reason Core Security