semeyka.m0nstr0v.2014.d.web-dlrip.1400mb.avi_24520.exe

SARKARA-GRUP LLC

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application semeyka.m0nstr0v.2014.d.web-dlrip.1400mb.avi_24520.exe by SARKARA-GRUP has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer.
Publisher:
SARKARA-GRUP LLC  (signed and verified)

Version:
1.0.0.0

MD5:
b2948d5fe94220973a40440f89ebf70f

SHA-1:
08b494cc0502c8897e52aba382a582f8044e2fe0

SHA-256:
c309aa4a945466ae88f53b613e7ea457c0ec6fe30c440596a6c93055f50dd654

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 6:47:38 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse.SARKARAG.Bundler (M)
16.6.14.7

File size:
5.2 MB (5,415,856 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Common path:
C:\users\{user}\downloads\semeyka.m0nstr0v.2014.d.web-dlrip.1400mb.avi_24520.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
12/2/2014 3:00:00 AM

Valid to:
12/3/2015 2:59:59 AM

Subject:
CN=SARKARA-GRUP LLC, O=SARKARA-GRUP LLC, L=Kyiv, S=Kyiv, C=UA

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
796A7EBB47570CA680BE9B9D828F2CC4

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:wHsu2DqYHDr5Q/aSyZ6ojJSbr3hbNMeEOmrDGp1HPsdaeUicgbzZ5u2j7i4c6eug:wB2DHDrGSljJSbr3hbKeEOmXG3UAihRg

Entry address:
0x751230

Entry point:
60, BE, 00, 40, 6F, 00, 8D, BE, 00, D0, D0, FF, C7, 87, A4, 10, 37, 00, 6A, 13, FF, 44, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
4.4 MB (4,579,328 bytes)