flashplayer_update.exe

The executable flashplayer_update.exe has been detected as malware by 21 anti-virus scanners. This is a setup program which is used to install the application. According to AVG, this software downloads additional adware offers during setup. The file has been seen being downloaded from www.txtpadonline.com.
Version:
1.0.0.0

MD5:
7d1968658efe149b66ada1cacfffc331

SHA-1:
d87123900724a1e11491480938dbd782fd9c3f17

SHA-256:
b55e45c2989676f5ceec5337b2d1f7afc9d59af33e652f15b7e505848288d0af

Scanner detections:
21 / 68

Status:
Malware

Analysis date:
12/28/2024 4:50:02 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.96804
474

Agnitum Outpost
Trojan.PWS.Banbra
7.1.1

Avira AntiVirus
TR/Dldr.Agent.385536.2
8.3.2.2

Arcabit
Trojan.Strictor.D17A24
1.0.0.582

avast!
MSIL:Banker-DY [Trj]
2014.9-151019

AVG
Downloader.MSIL
2016.0.2952

Bitdefender
Gen:Variant.Strictor.96804
1.0.20.1460

Emsisoft Anti-Malware
Gen:Variant.Strictor.96804
8.15.10.19.04

ESET NOD32
MSIL/TrojanDownloader.Banload.EX (variant)
9.12388

Fortinet FortiGate
MSIL/Banload.EV!tr.dldr
10/19/2015

F-Secure
Gen:Variant.Strictor.96804
11.2015-19-10_2

G Data
Gen:Variant.Strictor.96804
15.10.25

IKARUS anti.virus
Trojan-Downloader.MSIL.Banload
t3scan.1.9.5.0

Kaspersky
Trojan-Banker.Win32.Banbra
14.0.0.1254

McAfee
Artemis!7D1968658EFE
5600.6608

Microsoft Security Essentials
TrojanDownloader:MSIL/Banload.AB
1.1.12101.0

MicroWorld eScan
Gen:Variant.Strictor.96804
16.0.0.876

Panda Antivirus
Trj/CI.A
15.10.19.04

Sophos
Mal/Generic-S
4.98

Trend Micro
TROJ_GEN.R072C0DJ915
10.465.19

VIPRE Antivirus
Trojan.Win32.Generic
44446

File size:
376.5 KB (385,536 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
Relpx.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\flashplayer_update.exe

File PE Metadata
Compilation timestamp:
10/7/2015 2:50:04 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
3072:9quzJ+lM+sEvWfROJLhfJpreQ00ws/R3b/rz3qhQ6mPE6L/nATklRy9mj/O67xN:mWROJNhpeBUDnqyBLL/nATklY94

Entry address:
0x378AE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
214.5 KB (219,648 bytes)

The file flashplayer_update.exe has been seen being distributed by the following URL.

Remove flashplayer_update.exe - Powered by Reason Core Security