copy1-jotzey0214.exe

Jotzey

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application copy1-jotzey0214.exe by Jotzey has been detected as adware by 4 anti-malware scanners. The program is a setup application that uses the Nullsoft Scriptable Install System installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from secure.rocketdlgo.com.
Publisher:
Jotzey  (signed and verified)

MD5:
ab2ba19afa312085a8b175211877e5b5

SHA-1:
23971e5d6490f39a4bacbea1be7baa42cd573394

SHA-256:
c42576812a177cba4b1bd3f66581171babed828fa4b62d04098e8535e0667455

Scanner detections:
4 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
12/25/2024 1:14:51 AM UTC  (today)

Scan engine
Detection
Engine version

Malwarebytes
PUP.Optional.Jotzey.A
v2014.03.03.06

Reason Heuristics
PUP.Jotzey.Q
14.3.3.18

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14214

XVirus List
Win.Detected
2.3.31

File size:
227.7 KB (233,208 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Scriptable Install System

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\copy1-jotzey0214.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/12/2014 3:00:00 AM

Valid to:
1/13/2015 2:59:59 AM

Subject:
CN=Jotzey, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jotzey, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C7B335D1F24250859B4B5C0085A062C

File PE Metadata
Compilation timestamp:
12/6/2009 1:52:01 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:0Z+11RLM79CeG+p9/1RWBT5AYZm/G/HcV:1E9FnpZ1s15AB/G/8V

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9156  (probably packed)

Code size:
22.5 KB (23,040 bytes)

The file copy1-jotzey0214.exe has been seen being distributed by the following URL.

Remove copy1-jotzey0214.exe - Powered by Reason Core Security