websparkleuninstaller.exe

WebSparkle

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application websparkleuninstaller.exe by WebSparkle has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software. The file has been seen being downloaded from install.websparkle.biz.
Publisher:
WebSparkle  (signed and verified)

Version:
1.0.0.0

MD5:
5d8ef2b2077288fe6c5d239991da0afe

SHA-1:
cd08af64e0c6ef1eeabb300d87309029b4bb2674

SHA-256:
55b4c270a2eead8dc7a607320eca24f17390ffea93e07eba07f4ad177e7e8b8d

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
12/24/2024 12:26:31 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
16.7.17.15

File size:
512.3 KB (524,576 bytes)

Product version:
1.0.0.0

Original file name:
WebSparkle Uninstaller.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\websparkleuninstaller.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/13/2013 2:00:00 AM

Valid to:
8/14/2015 1:59:59 AM

Subject:
CN=WebSparkle, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=WebSparkle, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
36202DE0CBDFE10F57978E3766DB2ED4

File PE Metadata
Compilation timestamp:
5/6/2014 2:17:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:7uYJPlapwOBMBvM5NzR7iV1z6Czrb3rronvISa51ARFdtMQr0tZ5/ai0kPKE9yL/:C0mrBMJM5ivNzrb3f6q51ARhQr58Lfak

Entry address:
0x7E04E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
496.5 KB (508,416 bytes)

The file websparkleuninstaller.exe has been seen being distributed by the following URL.

Remove websparkleuninstaller.exe - Powered by Reason Core Security