v-bates.exe

Passion Fruit Tech

The file is part of Wajam, a web browser extension that injects social search integration into various search portals such as Google. The application v-bates.exe by Passion Fruit Tech has been detected as adware by 9 anti-malware scanners. This is a setup program which is used to install the application. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from 24b9c2b31b06c472fcca-681664e3535063ecf3a37aa4fc97770c.r32.cf5.rackcdn.com and multiple other hosts.
Publisher:
Wajamu   (signed by Passion Fruit Tech)

MD5:
7963e2b89821e47cec7af8ecc98934f9

SHA-1:
0b428c205efb1134207a31803688c9e8185ffefe

SHA-256:
ee0d0134b7220b41b4c397b5208444910c90fbbf30462909884c42a8230db83d

Scanner detections:
9 / 68

Status:
Adware

Analysis date:
12/24/2024 3:35:13 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SearchGuard.B
914

Bitdefender
Adware.SearchGuard.B
1.0.20.1080

Emsisoft Anti-Malware
Adware.SearchGuard
8.14.08.04.08

ESET NOD32
Win32/Toolbar.BitCocktail.B potentially unwanted application
7.0.302.0

F-Secure
Adware.SearchGuard.B
11.2014-04-08_2

G Data
Adware.SearchGuard
14.8.24

MicroWorld eScan
Adware.SearchGuard.B
15.0.0.648

nProtect
Adware.SearchGuard.B
14.08.04.01

Reason Heuristics
PUP.PassionFruitTech.H
14.8.31.22

File size:
2 MB (2,046,216 bytes)

Product version:
2.0.0.444

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\v-bates.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/20/2014 8:00:00 PM

Valid to:
7/21/2015 7:59:59 PM

Subject:
CN=Passion Fruit Tech, O=Passion Fruit Tech, STREET=Rakefet, L=Hod Hasharon, S=Israel, PostalCode=4520634, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3505FC58261F9FA827A43371A3AAEC54

File PE Metadata
Compilation timestamp:
1/30/2013 9:21:56 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
49152:CUdY989ZSN9AFTA/GjT+v1D7X9IFnMYWvO9EooiOQPL:hdY9EgNCp29o+bi5

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.9679

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file v-bates.exe has been seen being distributed by the following 2 URLs.

http://24b9c2b31b06c472fcca-681664e3535063ecf3a37aa4fc97770c.r32.cf5.rackcdn.com/prime/.../v-bates.exe

Remove v-bates.exe - Powered by Reason Core Security