safari_download.exe

DownloadShield

The application safari_download.exe by DownloadShield has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from www.browserwin.com. While running, it connects to the Internet address ps533545.dreamhost.com on port 443.
Publisher:
DownloadShield  (signed and verified)

MD5:
24a960f15e01dd200de1879355fc2f6a

SHA-1:
50fbc1060a63ab6e7afdc210f41d9f7ac6881268

SHA-256:
3451be61adcd50f0da2f7930b87714f8d848643a1395745d134d63b4192e48a2

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
2/25/2025 4:59:26 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.1.31.2

File size:
205.5 KB (210,400 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\safari_download.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/21/2015 7:00:00 PM

Valid to:
3/21/2019 7:59:59 PM

Subject:
CN=DownloadShield, O=DownloadShield, L=San Jose, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
78070F8D972292519C0C15749BCB3808

File PE Metadata
Compilation timestamp:
8/3/2015 10:43:56 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x31FD

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 57, 33, DB, 68, 01, 80, 00, 00, 89, 5C, 24, 1C, C7, 44, 24, 14, F0, 73, 40, 00, 33, F6, C6, 44, 24, 18, 20, FF, 15, B4, 70, 40, 00, FF, 15, B0, 70, 40, 00, 66, 83, F8, 06, 74, 11, 53, E8, F3, 26, 00, 00, 3B, C3, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 68, E8, 73, 40, 00, E8, 74, 26, 00, 00, 68, E0, 73, 40, 00, E8, 6A, 26, 00, 00, 68, D4, 73, 40, 00, E8, 60, 26, 00, 00, 6A, 0D, E8, C3, 26, 00, 00, 6A, 0B, E8, BC, 26, 00, 00, A3, 00, 3C, 42, 00, FF, 15, 34, 70, 40, 00, 53, FF...
 
[+]

Entropy:
7.7247

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file safari_download.exe has been seen being distributed by the following URL.

http://www.browserwin.com/safari/.../Safari_Download.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ps533545.dreamhost.com  (64.111.117.81:443)

TCP (HTTP):
Connects to server-52-84-132-29.atl52.r.cloudfront.net  (52.84.132.29:80)

TCP (HTTP):
Connects to server-52-84-33-52.ewr50.r.cloudfront.net  (52.84.33.52:80)

TCP (HTTP):
Connects to server-52-84-33-226.ewr50.r.cloudfront.net  (52.84.33.226:80)

TCP (HTTP):
Connects to p3nlhg686c1686.shr.prod.phx3.secureserver.net  (50.62.103.1:80)

TCP (HTTP):
Connects to usdal4-vip-bx-001.aaplimg.com  (17.253.3.201:80)

TCP (HTTP):
Connects to a104-91-166-178.deploy.static.akamaitechnologies.com  (104.91.166.178:80)

TCP (HTTP):
Connects to server-54-230-5-91.dfw3.r.cloudfront.net  (54.230.5.91:80)

TCP (HTTP SSL):
Connects to server-54-230-5-25.dfw3.r.cloudfront.net  (54.230.5.25:443)

TCP (HTTP):
Connects to server-54-230-5-237.dfw3.r.cloudfront.net  (54.230.5.237:80)

TCP (HTTP):
Connects to server-54-230-5-204.dfw3.r.cloudfront.net  (54.230.5.204:80)

TCP (HTTP):
Connects to server-54-230-5-174.dfw3.r.cloudfront.net  (54.230.5.174:80)

TCP (HTTP):
Connects to server-54-230-5-142.dfw3.r.cloudfront.net  (54.230.5.142:80)

TCP (HTTP):
Connects to server-54-230-206-106.atl50.r.cloudfront.net  (54.230.206.106:80)

TCP (HTTP):
Connects to server-54-230-122-30.dfw50.r.cloudfront.net  (54.230.122.30:80)

TCP (HTTP):
Connects to server-54-192-55-196.jfk6.r.cloudfront.net  (54.192.55.196:80)

TCP (HTTP):
Connects to server-54-192-123-208.dfw50.r.cloudfront.net  (54.192.123.208:80)

TCP (HTTP):
Connects to server-52-85-83-245.lax1.r.cloudfront.net  (52.85.83.245:80)

TCP (HTTP):
Connects to server-52-84-25-165.sea32.r.cloudfront.net  (52.84.25.165:80)

Remove safari_download.exe - Powered by Reason Core Security