teamviewer_download.exe

DownloadShield

The application teamviewer_download.exe by DownloadShield has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from www.browserwin.com. While running, it connects to the Internet address server-54-192-55-98.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
DownloadShield  (signed and verified)

MD5:
95acf129173b80fed34eb6317ceef030

SHA-1:
659572d8790542c4de8b911ae3ae0fe5df171e5b

SHA-256:
545f5c9a67e24d286178e6f916e7a463dfaad0b0615858358a717f442d738138

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/27/2024 1:06:06 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
17.1.29.23

File size:
205.4 KB (210,376 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\teamviewer_download.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/21/2015 7:00:00 PM

Valid to:
3/21/2019 7:59:59 PM

Subject:
CN=DownloadShield, O=DownloadShield, L=San Jose, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
78070F8D972292519C0C15749BCB3808

File PE Metadata
Compilation timestamp:
8/3/2015 10:43:56 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x31FD

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 57, 33, DB, 68, 01, 80, 00, 00, 89, 5C, 24, 1C, C7, 44, 24, 14, F0, 73, 40, 00, 33, F6, C6, 44, 24, 18, 20, FF, 15, B4, 70, 40, 00, FF, 15, B0, 70, 40, 00, 66, 83, F8, 06, 74, 11, 53, E8, F3, 26, 00, 00, 3B, C3, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 68, E8, 73, 40, 00, E8, 74, 26, 00, 00, 68, E0, 73, 40, 00, E8, 6A, 26, 00, 00, 68, D4, 73, 40, 00, E8, 60, 26, 00, 00, 6A, 0D, E8, C3, 26, 00, 00, 6A, 0B, E8, BC, 26, 00, 00, A3, 00, 3C, 42, 00, FF, 15, 34, 70, 40, 00, 53, FF...
 
[+]

Entropy:
7.7249

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file teamviewer_download.exe has been seen being distributed by the following URL.

http://www.browserwin.com/.../download

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ps533545.dreamhost.com  (64.111.117.81:443)

TCP (HTTP):
Connects to p3nlhg686c1686.shr.prod.phx3.secureserver.net  (50.62.103.1:80)

TCP (HTTP):
Connects to server-54-192-37-175.jfk1.r.cloudfront.net  (54.192.37.175:80)

TCP (HTTP):
Connects to server-52-84-95-131.yul62.r.cloudfront.net  (52.84.95.131:80)

TCP (HTTP):
Connects to server-52-85-83-47.lax1.r.cloudfront.net  (52.85.83.47:80)

TCP (HTTP):
Connects to server-52-85-83-12.lax1.r.cloudfront.net  (52.85.83.12:80)

TCP (HTTP):
Connects to server-52-84-126-50.iad16.r.cloudfront.net  (52.84.126.50:80)

TCP (HTTP):
Connects to server-52-84-126-107.iad16.r.cloudfront.net  (52.84.126.107:80)

TCP (HTTP):
Connects to server-54-230-122-174.dfw50.r.cloudfront.net  (54.230.122.174:80)

TCP (HTTP):
Connects to server-54-192-55-98.jfk6.r.cloudfront.net  (54.192.55.98:80)

TCP (HTTP):
Connects to server-52-84-7-187.ord54.r.cloudfront.net  (52.84.7.187:80)

TCP (HTTP SSL):
Connects to server-52-84-63-225.ord51.r.cloudfront.net  (52.84.63.225:443)

TCP (HTTP):
Connects to server-52-84-63-188.ord51.r.cloudfront.net  (52.84.63.188:80)

TCP (HTTP):
Connects to server-52-84-63-180.ord51.r.cloudfront.net  (52.84.63.180:80)

TCP (HTTP SSL):
Connects to server-52-84-132-179.atl52.r.cloudfront.net  (52.84.132.179:443)

Remove teamviewer_download.exe - Powered by Reason Core Security