tubeboxsetup.exe

KBM2 Installer

sterkly LLC

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application tubeboxsetup.exe by sterkly has been detected as adware by 5 anti-malware scanners. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. While running, it connects to the Internet address api.yontoo.com on port 80 using the HTTP protocol.
Publisher:
sterkly LLC  (signed and verified)

Product:
KBM2 Installer

Version:
2.1.0.1

MD5:
c74a2c9f7fca729813484830b3743ba2

SHA-1:
b2e81e5195a250a62f9fe35fe9830a5dd97430d0

SHA-256:
ce719ecfc47d873662bf55f797fb53433356d033db857ecb97da2b899fb51cad

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
12/24/2024 11:29:36 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Trojan.Win32.KBM
4.0.3.14516

Dr.Web
Adware.Plugin.18
9.0.1.0136

ESET NOD32
Win32/KBM (variant)
8.9476

Reason Heuristics
PUP.Installer.sterkly.M
14.5.16.13

VIPRE Antivirus
sterkly LLC
26878

File size:
521.6 KB (534,136 bytes)

Product version:
2.1.0.1

Copyright:
(c) Sterkly LLC. All rights reserved.

Original file name:
KBM2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\fb\tubeboxsetup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/26/2012 1:00:00 AM

Valid to:
1/26/2013 12:59:59 AM

Subject:
CN=sterkly LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=sterkly LLC, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
136DB6717AA1462B8176971FE58FEBD6

File PE Metadata
Compilation timestamp:
8/30/2012 10:45:19 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:TMBNfoLYC0LexiXZZ47eHqxeDIq6lWb8rYQZG0QQBeA:TMHbCeYiQ7XxeolW+5ZG0QQAA

Entry address:
0x391E8

Entry point:
E8, A6, 6C, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, D0, FB, 46, 00, 75, 02, F3, C3, E9, 2D, 6D, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 61, 83, 7D, 08, 00, 75, 13, E8, 71, 33, 00, 00, 6A, 16, 5E, 89, 30, E8, 04, 73, 00, 00, 8B, C6, EB, 48, 83, 7D, 10, 00, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, FE, 6D, 00, 00, 83, C4, 0C, EB, C7, FF, 75, 0C, 6A, 00, FF, 75, 08, E8, 4C, 2F, 00, 00, 83, C4, 0C, 83, 7D, 10, 00, 74, BB, 39, 75, 0C, 73, 0E, E8, 27, 33, 00, 00, 6A...
 
[+]

Code size:
337.5 KB (345,600 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove tubeboxsetup.exe - Powered by Reason Core Security