FollowRules2017021503.exe

Geowide

The file FollowRules2017021503.exe by Geowide has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Geowide  (signed and verified)

Version:
1.0.6254.34486

MD5:
a5ac5623d26e9450eb6438cd870c64ce

SHA-1:
69a3c951b3a86f7d5f4729935771f6bcb5895af0

SHA-256:
40926e9329c8cb15d6c534e5368d95a1f97640596a34087c2e4057578e008cbb

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/6/2024 6:37:17 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.2.16.7

File size:
634.9 KB (650,144 bytes)

Product version:
1.0.6254.34486

Original file name:
FollowRules2017021503.exe

Language:
Language Neutral

Common path:
C:\Program Files\follow rules\bin\tmp79c2.tmp

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
10/21/2016 8:00:00 AM

Valid to:
10/22/2017 7:59:59 AM

Subject:
CN=Geowide, O=Geowide, L=San Diego, S=California, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
05EDA5D2409A581DDAF90CD466140FF1

File PE Metadata
Compilation timestamp:
2/15/2017 11:09:40 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x9E8DE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1404

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
626.5 KB (641,536 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a45-121-219-217.deploy.akamaitechnologies.com  (45.121.219.217:80)

TCP (HTTP):
Connects to a45-121-219-225.deploy.akamaitechnologies.com  (45.121.219.225:80)

TCP (HTTP):
Connects to eu-us.cdn.hiberniacdn.com  (128.127.159.5:80)

TCP (HTTP):
Connects to a23-66-149-209.deploy.static.akamaitechnologies.com  (23.66.149.209:80)

Remove FollowRules2017021503.exe - Powered by Reason Core Security