nst828f.tmp

The file nst828f.tmp has been detected as a potentially unwanted program by 15 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The installer uses the InstallMonetizer platform which will donwload and install adware toolbars and other potentially unwanted software offers during setup. The file has been seen being downloaded from 113.171.224.216 and multiple other hosts.
MD5:
756c3b743575b900206630a2e7135f1b

SHA-1:
2e4f82f1501f380422bd4a90a6611a056f08d421

SHA-256:
66e09ff598ced3c4446f4e50b80856eafe190b3a431d5e4d8e20828491c8e06f

Scanner detections:
15 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallMonetizer distribution platform to bundle adware.

Analysis date:
11/5/2024 3:27:47 PM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
Pua.Installmonetizer.Gen!c
2.1.4+

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
PUA/InstallMonetizer.Gen
8.3.3.2

AVG
Could be an adware AdInstaller
2015.0.4530

Clam AntiVirus
Win.Adware.Outbrowse-1198
0.98/21511

Dr.Web
Adware.InstallMonetizer.1
9.0.1.053

ESET NOD32
Win32/InstallMonetizer.BJ potentially unwanted application
8.0.319.0

G Data
NSIS.Application.InstallMonetizer
16.2.25

IKARUS anti.virus
not-a-virus:Downloader.SilentInstall
t3scan.2.0.6.0

Malwarebytes
PUP.Optional.CheckOffer
v2016.02.22.12

McAfee
Artemis!756C3B743575
5600.6481

NANO AntiVirus
Riskware.Win32.InstallMonetizer.dymuwe
1.0.14.6204

Reason Heuristics
Adware.Bundler (M)
16.3.10.21

Rising Antivirus
PE:Malware.Generic/QRS!1.9E2D [F]
23.00.65.16220

SUPERAntiSpyware
Adware.InstallMonetizer/Variant
9308

File size:
226.4 KB (231,801 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\nst828f.tmp

File PE Metadata
Compilation timestamp:
12/6/2009 5:52:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:NFJ06/GZEtX0c+27pJ59E6rTUadigTZ/t5q2pd5A8Wwy:h/GZfd27pBxddZ/bJd5A8i

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.8411

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file nst828f.tmp has been seen being distributed by the following 6 URLs.

http://113.171.224.216/.../VuuPC_VO2_8907.exe

http://113.171.224.170/.../VuuPC_VO2_8907.exe

http://91.194.162.11/.../VuuPC_VO2_8907.exe

Remove nst828f.tmp - Powered by Reason Core Security