flashplayer_update.exe

IconsDB

The executable flashplayer_update.exe has been detected as malware by 22 anti-virus scanners. This is a setup program which is used to install the application. According to AVG, this software downloads additional adware offers during setup. The file has been seen being downloaded from www.txtpadonline.com.
Publisher:
IconsDB  (signed and verified)

Version:
1.0.0.0

MD5:
e7f108381f2eadc697b7d81772d81adf

SHA-1:
e811c0e8b4132d01cfdd6c8d1bfa4059574c15c5

SHA-256:
f17ef5382b9770471d6e16b623372c6188e08aa47ae46fb4112351b659a85f3a

Scanner detections:
22 / 68

Status:
Malware

Analysis date:
1/6/2025 12:39:44 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.96804
383

Agnitum Outpost
Trojan.PWS.Banbra
7.1.1

Avira AntiVirus
TR/Dldr.Agent.385536.2
8.3.2.2

Arcabit
Trojan.Strictor.D17A24
1.0.0.582

avast!
MSIL:Banker-DY [Trj]
2014.9-160118

AVG
Downloader.MSIL
2017.0.2861

Bitdefender
Gen:Variant.Strictor.96804
1.0.20.90

Emsisoft Anti-Malware
Gen:Variant.Strictor.96804
8.16.01.18.03

ESET NOD32
MSIL/TrojanDownloader.Banload.EX (variant)
10.12391

Fortinet FortiGate
MSIL/Banload.EV!tr.dldr
1/18/2016

F-Secure
Gen:Variant.Strictor.96804
11.2016-18-01_2

G Data
Gen:Variant.Strictor.96804
16.1.25

Kaspersky
Trojan-Banker.Win32.Banbra
14.0.0.799

McAfee
Artemis!E7F108381F2E
5600.6517

Microsoft Security Essentials
TrojanDownloader:MSIL/Banload.AB
1.1.12101.0

MicroWorld eScan
Gen:Variant.Strictor.96804
17.0.0.54

Panda Antivirus
Trj/CI.A
16.01.18.03

Qihoo 360 Security
Win32/Trojan.1f6
1.0.0.1015

Rising Antivirus
PE:Malware.RDM.40!5.2E[F1]
23.00.65.16116

Sophos
Mal/Generic-S
4.98

Trend Micro
TROJ_GEN.R00XC0DJB15
10.465.18

VIPRE Antivirus
Trojan.Win32.Generic
44474

File size:
378 KB (387,032 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
Relpx.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\flashplayer_update.exe

Digital Signature
Signed by:

Authority:
IconsDB

Valid from:
9/16/2015 12:53:42 PM

Valid to:
9/16/2016 12:53:42 PM

Subject:
CN=www.iconsdb.com, O=IconsDB, L=Lisboa, S=Lisboa, C=PT

Issuer:
CN=www.iconsdb.com, O=IconsDB, L=Lisboa, S=Lisboa, C=PT

Serial number:
00D35D24937EB7AB43

File PE Metadata
Compilation timestamp:
10/7/2015 2:50:04 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
3072:VquzJ+lM+sEvWfROJLhfJpreQ00ws/R3b/rz3qhQ6mPE6L/nATklRy9mj/O67xNl:uWROJNhpeBUDnqyBLL/nATklY94l

Entry address:
0x378AE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
214.5 KB (219,648 bytes)

The file flashplayer_update.exe has been seen being distributed by the following URL.

http://www.txtpadonline.com/link.php

Remove flashplayer_update.exe - Powered by Reason Core Security