jwplayer.exe

Installation-Wizard

dailytools GmbH

The application jwplayer.exe by dailytools GmbH has been detected as adware by 7 anti-malware scanners. The file has been seen being downloaded from www.joosoft.com and multiple other hosts.
Publisher:
dailytools GmbH  (signed and verified)

Product:
Installation-Wizard

Version:
1.0.0.5

MD5:
7951295146fe8060b6835b071fd8c108

SHA-1:
f22f24b30d6f08026c244444f32a28658df48b2b

SHA-256:
93073fec6f62a5feecfe4b2dbbe289b8c33dba9d06fc8ec68699b30acdc39f72

Scanner detections:
7 / 68

Status:
Adware

Analysis date:
12/24/2024 5:27:10 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Dailytools
2015.0.3249

Baidu Antivirus
PUA.Win32.JooSoft
4.0.3.141226

ESET NOD32
Win32/Downloader.JooSoft (variant)
8.10926

G Data
Win32.Adware.JooSoft
14.12.24

McAfee
Artemis!7951295146FE
5600.6905

Reason Heuristics
PUP.dailytoolsGmbH
15.2.14.11

VIPRE Antivirus
Trojan.Win32.Generic
36062

File size:
730 KB (747,512 bytes)

Product version:
1.0.0.5

Copyright:
(c) Dailytools GmbH. All rights reserved.

Original file name:
install.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\jwplayer.exe

Digital Signature
Signed by:

Authority:
DigiCert Inc

Valid from:
3/31/2014 3:00:00 AM

Valid to:
6/1/2017 3:00:00 PM

Subject:
CN=dailytools GmbH, O=dailytools GmbH, L=Zug, S=Zug, C=CH, PostalCode=6300, STREET=Unter Altstadt 10, SERIALNUMBER=CHE-202.738.833, OID.1.3.6.1.4.1.311.60.2.1.3=CH, OID.2.5.4.15=Private Organization

Issuer:
CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0B9A96E11B57D155C12F7811BF1B8CF3

File PE Metadata
Compilation timestamp:
7/26/2014 1:55:09 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:XjH6gpRCK3/J3GgvJQ50cAIvga0zgK51577dKtGFI:XjH6gpR//J3TD1IX0zgKf77dMGFI

Entry address:
0x344C8

Entry point:
E8, 76, 73, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 61, 83, 7D, 08, 00, 75, 13, E8, 86, 2F, 00, 00, 6A, 16, 5E, 89, 30, E8, 70, 75, 00, 00, 8B, C6, EB, 48, 83, 7D, 10, 00, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, 0D, 23, 00, 00, 83, C4, 0C, EB, C7, FF, 75, 0C, 6A, 00, FF, 75, 08, E8, 6B, 26, 00, 00, 83, C4, 0C, 83, 7D, 10, 00, 74, BB, 39, 75, 0C, 73, 0E, E8, 3C, 2F, 00, 00, 6A, 22, 59, 89, 08, 8B, F1, EB, B2, 6A, 16, 58, 5E, 5D, C3, 8B...
 
[+]

Entropy:
6.1037

Code size:
319 KB (326,656 bytes)

The file jwplayer.exe has been seen being distributed by the following 3 URLs.

http://www.joosoft.com/pl/.../jw-player

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-46-137-107-77.eu-west-1.compute.amazonaws.com  (46.137.107.77:80)

TCP (HTTP):
Connects to ec2-54-195-245-121.eu-west-1.compute.amazonaws.com  (54.195.245.121:80)

TCP (HTTP):
Connects to ec2-46-137-181-240.eu-west-1.compute.amazonaws.com  (46.137.181.240:80)

Remove jwplayer.exe - Powered by Reason Core Security