nihongo 500 mon pdf n4_10924_i33894010_il345.exe

Runner Utility

BERSHNET LLC

The application nihongo 500 mon pdf n4_10924_i33894010_il345.exe by BERSHNET has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is also typically executed from the user's temporary directory.
Publisher:
Dummy, Ltd.  (signed by BERSHNET LLC)

Product:
Runner Utility

Version:
1.0.0.187

MD5:
1f8b2cb438d5d6ed2d807c2ea9efaf33

SHA-1:
d838010f0eccdb9b29cc05a84869313a3e2d0189

SHA-256:
80f560662a6b0a72a7d78d37a430a16531bc370263e361ea390637beb0579cb8

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/25/2024 3:42:35 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.BERSHNET (M)
15.7.17.20

File size:
1.5 MB (1,544,720 bytes)

Product version:
1.0.0.187

Copyright:
Copyright (C) 2013

Original file name:
runner.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\nihongo 500 mon pdf n4_10924_i33894010_il345.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/6/2015 1:00:00 AM

Valid to:
2/7/2016 12:59:59 AM

Subject:
CN=BERSHNET LLC, O=BERSHNET LLC, STREET="st. 600-richya b.66, of.10", L=Vinnitsya, S=Vinnitskaya, PostalCode=21027, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E2D6C6F8DDF832E09DCF766B299AD2A9

File PE Metadata
Compilation timestamp:
7/17/2015 10:13:06 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:egNZ4iFeVCEtgv6PQjKkLNt0YS27LSwoNUlUl8hGVEd/WWATgot7pqmlzAefNKHk:llFqA6PiKgRS2el8gVeWWmTtnL1KH08A

Entry address:
0x3D8450

Entry point:
68, 0E, 45, BE, 94, E8, 77, 7A, 00, 00, E9, 20, 64, 00, 00, 1A, D0, 73, 1F, C7, 69, CF, 0E, 58, D1, 56, A2, AA, 76, 36, BB, 60, 24, B4, 7E, 29, E1, 8D, 38, C5, 91, 22, CA, 4F, 03, 8C, 62, F1, A5, 2E, F8, BF, 4E, AD, 78, 5B, 9A, 6C, CB, 8A, B1, 7B, 07, B2, 8A, 68, CB, 8A, 94, 1F, 0C, F6, 81, E6, 64, A2, DA, DB, 97, 57, 3F, B5, 06, 86, 9F, 54, 90, 17, 85, 5C, 1C, 01, 63, BE, 77, 09, 6F, 6F, 14, BA, 68, DA, 48, 29, 5F, CD, 94, BB, DA, A3, 02, 58, 11, 43, 41, D3, A2, 10, 93, 57, A1, AE, 94, 3C, 8B, DC, EC, 55...
 
[+]

Code size:
187.5 KB (192,000 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-243-171-90.compute-1.amazonaws.com  (54.243.171.90:80)

TCP (HTTP):
Connects to ec2-54-225-247-99.compute-1.amazonaws.com  (54.225.247.99:80)