ins_postinst.exe

Goobzo LTD

The application ins_postinst.exe by Goobzo has been detected as adware by 17 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from d3dle8xo1zpfnz.cloudfront.net. While running, it connects to the Internet address ip-50-63-202-45.ip.secureserver.net on port 80 using the HTTP protocol.
Publisher:
Goobzo LTD  (signed and verified)

Version:
2.2.0.999

MD5:
f9092a47c8e3b49ae282a8b4e97d5599

SHA-1:
40a356948e61bb3ae708fb6c2bf3790a32726f7c

SHA-256:
feddd4b415a234770ebf02d1e756039c4717a22ff6ba37b04e9b2af74c6fa80a

Scanner detections:
17 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
11/15/2024 9:23:57 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.62444
760

AhnLab V3 Security
PUP/Win32.CrossRider
2015.01.05

Avira AntiVirus
ADWARE/CrossRider.Gen
7.11.199.138

avast!
Win32:Adware-CDO [PUP]
2014.9-150106

AVG
Skodna
2016.0.3238

Bitdefender
Gen:Variant.Strictor.62444
1.0.20.30

Dr.Web
Win32.HLLW.Unjap.279
9.0.1.06

Emsisoft Anti-Malware
Gen:Variant.Strictor.62444
8.15.01.06.07

ESET NOD32
Win32/SpeedBit (variant)
9.10966

F-Secure
Gen:Variant.Strictor.62444
11.2015-06-01_3

G Data
Gen:Variant.Strictor.62444
15.1.24

K7 AntiVirus
Unwanted-Program
13.1814541

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
14.0.0.2683

MicroWorld eScan
Gen:Variant.Strictor.62444
16.0.0.18

NANO AntiVirus
Riskware.Win32.Unjap.dlkbda
0.30.0.64448

Reason Heuristics
PUP.Goobzo.M
15.1.6.7

VIPRE Antivirus
Goobzo
36390

File size:
1.2 MB (1,206,160 bytes)

Product version:
2.2.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\installer\installiwebar_1364\ins_postinst.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
5/2/2013 2:00:00 AM

Valid to:
5/3/2015 1:59:59 AM

Subject:
CN=Goobzo LTD, O=Goobzo LTD, L=Haifa, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
120B25DDE57B88636AD4D97D23B99C88

File PE Metadata
Compilation timestamp:
1/5/2015 9:10:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:SuAnlRp52AWY6LFtsm+818XRA2DPakTVm2hBQ+NyJUgIJAAxNfVIK:NApDWY6LFtsn81kRrDPakTV3hBjNyJ7G

Entry address:
0x594AF

Entry point:
E8, AE, E0, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 08, AA, 4D, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 80, 77, 4D, 00, 01, 0F, 82, E6, E1, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2...
 
[+]

Code size:
631.5 KB (646,656 bytes)

The file ins_postinst.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-150-71.sin2.r.cloudfront.net  (54.230.150.71:80)

TCP (HTTP):
Connects to server-54-230-150-176.sin2.r.cloudfront.net  (54.230.150.176:80)

TCP (HTTP):
Connects to server-54-230-150-157.sin2.r.cloudfront.net  (54.230.150.157:80)

TCP (HTTP):
Connects to ip-50-63-202-45.ip.secureserver.net  (50.63.202.45:80)

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to server-54-192-230-246.waw50.r.cloudfront.net  (54.192.230.246:80)

TCP (HTTP):
Connects to server-54-230-202-5.fra50.r.cloudfront.net  (54.230.202.5:80)

TCP (HTTP):
Connects to server-54-192-230-96.waw50.r.cloudfront.net  (54.192.230.96:80)

TCP (HTTP):
Connects to server-54-192-230-71.waw50.r.cloudfront.net  (54.192.230.71:80)

TCP (HTTP):
Connects to server-54-239-168-201.fra50.r.cloudfront.net  (54.239.168.201:80)

TCP (HTTP):
Connects to server-54-230-203-165.fra50.r.cloudfront.net  (54.230.203.165:80)

TCP (HTTP):
Connects to server-54-230-201-87.fra50.r.cloudfront.net  (54.230.201.87:80)

TCP (HTTP):
Connects to server-54-230-201-26.fra50.r.cloudfront.net  (54.230.201.26:80)

TCP (HTTP):
Connects to server-54-230-201-205.fra50.r.cloudfront.net  (54.230.201.205:80)

TCP (HTTP):
Connects to server-54-230-201-178.fra50.r.cloudfront.net  (54.230.201.178:80)

TCP (HTTP):
Connects to server-54-230-201-132.fra50.r.cloudfront.net  (54.230.201.132:80)

TCP (HTTP):
Connects to server-54-230-200-83.fra50.r.cloudfront.net  (54.230.200.83:80)

TCP (HTTP):
Connects to server-54-230-200-21.fra50.r.cloudfront.net  (54.230.200.21:80)

TCP (HTTP):
Connects to server-54-230-200-154.fra50.r.cloudfront.net  (54.230.200.154:80)

TCP (HTTP):
Connects to server-54-192-230-40.waw50.r.cloudfront.net  (54.192.230.40:80)

Remove ins_postinst.exe - Powered by Reason Core Security