iroot.exe

File

appS marKet abC

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application iroot.exe by appS marKet abC has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.down0101life.info.
Publisher:
appS marKet abC  (signed and verified)

Product:
File

Version:
1.9.3.0

MD5:
23c6d67aac3b34572962174a855a118d

SHA-1:
ed33248576f5bf3228509b4029261e17bebd0aaf

SHA-256:
9f4c7add816bdbabb8d9c5b49f2dc22673b64008534b736e440ebf300b85e38a

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/24/2024 2:37:18 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse.appSmarKetabC.Bundler (M)
16.2.24.23

File size:
1 MB (1,100,592 bytes)

Product version:
1.9.3.0

Copyright:
File

Original file name:
Ionic.Zip-2015Mar30-050839-d11fdfd8-f4ac-408c-a478-4043f63951f1.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Common path:
C:\users\{user}\downloads\iroot.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
3/25/2015 6:00:00 PM

Valid to:
1/27/2016 5:59:59 PM

Subject:
CN=appS marKet abC, O=appS marKet abC, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
071709D5ED48BE5FC7460A34370E0E78

File PE Metadata
Compilation timestamp:
3/29/2015 11:08:39 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:gbSaE4mvt/jHzpOvgds73EiOSfh/8qM3g/o:gbSv4mvlVCFM3g/o

Entry address:
0x75F3E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.5475

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
464 KB (475,136 bytes)

The file iroot.exe has been seen being distributed by the following URL.

Remove iroot.exe - Powered by Reason Core Security