pagerage.exe

KBM2 Installer

sterkly LLC

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application pagerage.exe by sterkly has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. The file has been seen being downloaded from api.kbm2.com.
Publisher:
sterkly LLC  (signed and verified)

Product:
KBM2 Installer

Version:
1.6.1.0

MD5:
40f13e88a4ce7668d6b2596020f0e5f7

SHA-1:
2ef1c7250f5b165561594f08f9fc232bc13c9809

SHA-256:
ab746300431b9d8978927d7d84cfac48ff5636354fcc24b7d766c716b7aab415

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
11/26/2024 11:54:21 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
16.9.27.1

File size:
528.6 KB (541,328 bytes)

Product version:
1.6.1.0

Copyright:
(c) Sterkly LLC. All rights reserved.

Original file name:
KBM2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\pagerage.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/26/2012 1:00:00 AM

Valid to:
1/26/2013 12:59:59 AM

Subject:
CN=sterkly LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=sterkly LLC, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
136DB6717AA1462B8176971FE58FEBD6

File PE Metadata
Compilation timestamp:
3/27/2012 11:50:04 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:46GOYfLVfCsgKTZ13TTVTs4b2zPDZapv/iDn0ZLheQ4WTs:46GO0fPfb1TBb2zLZoiD0ZLheQ4WTs

Entry address:
0x38B5A

Entry point:
E8, A4, 6C, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, D0, EB, 46, 00, 75, 02, F3, C3, E9, 2B, 6D, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 61, 83, 7D, 08, 00, 75, 13, E8, 6F, 33, 00, 00, 6A, 16, 5E, 89, 30, E8, 02, 73, 00, 00, 8B, C6, EB, 48, 83, 7D, 10, 00, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, FC, 6D, 00, 00, 83, C4, 0C, EB, C7, FF, 75, 0C, 6A, 00, FF, 75, 08, E8, 4A, 2F, 00, 00, 83, C4, 0C, 83, 7D, 10, 00, 74, BB, 39, 75, 0C, 73, 0E, E8, 25, 33, 00, 00, 6A...
 
[+]

Code size:
335.5 KB (343,552 bytes)

The file pagerage.exe has been seen being distributed by the following URL.

http://api.kbm2.com/DownloadLauncher.ashx?id=1&message=affid=40&s1=CD5062&s2=179438408a28535840&s3=&s4=&s5=&cid=19270&o=251&s=208695243&p=40&a=CD5062&cmp=251&stld=TRANSACTION_ID

Remove pagerage.exe - Powered by Reason Core Security