1agrj200.exe

Bubble Dock

NOSIBAY

The application 1agrj200.exe, “Bubble Dock installer” by NOSIBAY has been detected as a potentially unwanted program by 18 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from d2vubraihqcany.cloudfront.net.
Publisher:
NOSIBAY  (signed and verified)

Product:
Bubble Dock

Description:
Bubble Dock installer

Version:
3.0.641.0.60224

MD5:
fdb405007358231656ab099a7bd29fcf

SHA-1:
84289c237ee9de11ebd625d2fff2610071e3eaaf

SHA-256:
edc8c748157aca3cdd46d9b7824f31e1ceaf94faf342193ea6693507a4340fbe

Scanner detections:
18 / 68

Status:
Potentially unwanted

Analysis date:
4/25/2024 7:51:50 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.BubbleDock
2015.05.07

AVG
Generic
2016.0.3068

Baidu Antivirus
PUA.Win32.BubbleDock
4.0.3.15624

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Adware.Downware.5766
9.0.1.0175

ESET NOD32
Win32/BubbleDock.A potentially unwanted
9.11589

G Data
Win32.Trojan.Agent.DCE9JB
15.6.25

K7 AntiVirus
Trojan
13.203.15832

Kaspersky
not-a-virus:Downloader.NSIS.Agent
14.0.0.1835

Malwarebytes
PUP.Optional.BubbleDock.A
v2015.06.24.10

McAfee
Artemis!FDB405007358
5600.6724

Panda Antivirus
PUP/Nosibay
15.06.24.10

Qihoo 360 Security
HEUR/QVM42.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.NOSIBAY.Installer (M)
15.6.24.22

Sophos
Bubble Dock
4.98

Trend Micro House Call
Suspicious_GEN.F47V0504
7.2.175

VIPRE Antivirus
Trojan.Win32.Generic
40020

Zillya! Antivirus
Downloader.Agent.Win32.223302
2.0.0.2168

File size:
364.1 KB (372,864 bytes)

Copyright:
© Nosibay

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\1agrj200.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
9/21/2013 2:00:00 AM

Valid to:
11/21/2014 12:59:59 AM

Subject:
CN=NOSIBAY, OU=Nosibay Secure Developement, O=NOSIBAY, L=PEROLS, S=Hérault, C=FR

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
4F1CA396B891ED381AFEECC074DB8714

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:Ms3B3ri0RfDR9/0dZWLMb0Xudr3DV4w/xC03tpHzabZCq:zTBj/02kdr3DrZCotpTaFCq

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file 1agrj200.exe has been seen being distributed by the following URL.

Remove 1agrj200.exe - Powered by Reason Core Security