followrules.dll

Follow Rules

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module followrules.dll by Follow Rules has been detected as adware by 16 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. The file has been seen being downloaded from install-cdn.followrulessoftware.com.
Publisher:
Follow Rules  (signed and verified)

Product:
Follow Rules

Version:
1.0.0.7

MD5:
e07e33c1878406dc4578caa028c68687

SHA-1:
2befe0411c0d1b3f928b65bd4adf56b5db49e5c5

SHA-256:
0c74cc39d7a0e0455bef0e42f79e33feaffc0a68fcef8a5aeef24aff0958ade9

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
12/26/2024 4:17:58 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.217.28

avast!
MSIL:BrowseFox-S [PUP]
150303-0

AVG
Generic
2016.0.3171

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15314

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Browsefox-411
0.98/21511

Dr.Web
Trojan.Yontoo.1016
9.0.1.05190

ESET NOD32
Win32/BrowseFox.AE potentially unwanted application
7.0.302.0

F-Prot
W32/S-f64f6ec1
v6.4.7.1.166

herdProtect (fuzzy)
2015.6.20.6

IKARUS anti.virus
PUA.BrowseFox
t3scan.1.8.6.0

K7 AntiVirus
Trojan
13.200.15259

Malwarebytes
PUP.Optional.FollowRules.A
v2015.03.14.12

NANO AntiVirus
Trojan.Win32.Yontoo.dnkubo
0.30.0.296

Reason Heuristics
PUP.Yontoo
15.3.14.0

Vba32 AntiVirus
AdWare.MSIL.Agent
3.12.26.3

File size:
262.7 KB (269,040 bytes)

Product version:
1.0.0.7

Copyright:
(c) Follow Rules. All rights reserved.

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\nhwq7hbw\followrules.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/10/2015 4:00:00 PM

Valid to:
1/11/2016 3:59:59 PM

Subject:
CN=Follow Rules, O=Follow Rules, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
360C16AC576B09F5DFA927EA0089856F

File PE Metadata
Compilation timestamp:
2/23/2015 5:06:59 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:qmiYckCqEbUViVqUsVNXBB+/DFK3wY+K19ZKT3h2fjcEy:qmiYckOiiVMrXBdD9ZwEAx

Entry address:
0xF515

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EA, 7E, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, D8, 21, 03, 10, E8, 4C, 02, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 4C, 77, 03, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, C4, 93, 02, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
6.0740

Developed / compiled with:
Microsoft Visual C++

Code size:
159 KB (162,816 bytes)

The file followrules.dll has been seen being distributed by the following URL.

Remove followrules.dll - Powered by Reason Core Security