0ab3rn1.exe

2126_obw_webssearches

Zhang Ling

The application 0ab3rn1.exe by Zhang Ling has been detected as adware by 21 anti-malware scanners. This is a setup program which is used to install the application. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from www.girlliuxiaoqing.com.
Publisher:
JWTab  (signed by Zhang Ling)

Product:
2126_obw_webssearches

Description:
Tab Syn

Version:
6.3.7601.1275

MD5:
c6342e2f4e3a790722e305a46b52b1bd

SHA-1:
71fc07e14a5d6ffce0d1509946643c1b197089d4

SHA-256:
426cce2add5876618fb3f387192d6e46e7b2adbb1700e83392e8c0f9b320a7f0

Scanner detections:
21 / 68

Status:
Adware

Analysis date:
5/12/2024 5:50:24 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Application.Elex.1
800

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.SearchHijacker
2014.11.27

Baidu Antivirus
PUA.Win32.LiMo
4.0.3.141127

Bitdefender
Gen:Application.Elex.1
1.0.20.1655

Dr.Web
Adware.Mutabaha.84
9.0.1.0331

ESET NOD32
Win32/LiMo (variant)
8.10789

Fortinet FortiGate
Riskware/LiMo
11/30/2014

F-Secure
Gen:Application.Elex.1
11.2014-27-11_5

G Data
Gen:Application.Elex
14.11.24

IKARUS anti.virus
PUA.LiMo
t3scan.1.8.3.0

K7 AntiVirus
Trojan
13.186.14150

Malwarebytes
PUP.Optional.Bundle
v2014.11.27.10

McAfee
Artemis!C6342E2F4E3A
5600.6934

MicroWorld eScan
Gen:Application.Elex.1
15.0.0.993

Panda Antivirus
Trj/Chgt.N
14.11.30.11

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.ZhangLing.H
14.11.27.10

Sophos
Generic PUA OL
4.98

Trend Micro House Call
Suspicious_GEN.F47V1126
7.2.334

VIPRE Antivirus
Trojan.Win32.Generic
35258

File size:
285.1 KB (291,952 bytes)

Product version:
6.3.7601.1275

Copyright:
JWTab

Original file name:
Tab.exe

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\0ab3rn1.exe

Digital Signature
Signed by:

Authority:
WoSign CA Limited

Valid from:
11/23/2014 11:03:49 PM

Valid to:
6/23/2015 11:03:49 PM

Subject:
CN=Zhang Ling, L=北京市, S=北京市, C=CN

Issuer:
CN=WoSign Class 2 Code Signing CA, O=WoSign CA Limited, C=CN

Serial number:
64AA90E4D11751F466378DD4391C2CAB

File PE Metadata
Compilation timestamp:
11/12/2014 10:51:38 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:bhDG2kR1028HY3zugTBeRM3Znudpzr2SUUsb+4TdRnBHJbhlxOxtsEksyA+VxgN:1DnS1028HEugTB+IudV2l7dTzPtA+AN

Entry address:
0x11DB6

Entry point:
E8, 43, BE, 00, 00, E9, 7F, FE, FF, FF, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 14, CD, 43, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 50, 78, 43, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 14, CD, 43, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7, C6, 03, 00, 00, 00...
 
[+]

Code size:
167.5 KB (171,520 bytes)

The file 0ab3rn1.exe has been seen being distributed by the following URL.

Remove 0ab3rn1.exe - Powered by Reason Core Security