1plhblkxusg==4.exe

Air Globe

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application 1plhblkxusg==4.exe by Air Globe has been detected as adware by 26 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from install-cdn.airglobeapp.com.
Publisher:
Air Globe  (signed and verified)

MD5:
38c1f766bb2e82197b63c4a26a9a30b3

SHA-1:
a4f428360317300ab6cbedfa673cfa609c148e65

SHA-256:
885b9e1db759f4ff5307a56ee414a8ac65b30932216eadc3f85abad80e14d212

Scanner detections:
26 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/1/2024 2:52:30 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.1
5721252

Agnitum Outpost
PUA.Kranet
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.05.02

AVG
Adware AdPlugin.CVG
2014.0.4311

Bitdefender
Gen:Variant.Adware.SwiftBrowse.1
1.0.20.605

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-34627
0.98/21511

Dr.Web
Trojan.Yontoo.1734
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
9.0.0.4799

ESET NOD32
Win32/BrowseFox.AV potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/BrowseFox
5/1/2015

F-Secure
Gen:Variant.Adware.SwiftBrowse
11.2015-01-05_6

G Data
Gen:Variant.Adware.SwiftBrowse
15.5.25

herdProtect (fuzzy)
2015.7.31.6

K7 AntiVirus
Unwanted-Program
13.203.15777

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Kranet
14.0.0.2107

McAfee
Trojan.Artemis!6A7A31BBA6A6
16.8.708.2

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.1
16.0.0.363

NANO AntiVirus
Trojan.Nsis.BrowseFox.dnxihk
0.30.24.1357

Norman
Gen:Variant.Adware.SwiftBrowse.1
03.12.2014 13:20:04

Qihoo 360 Security
HEUR/QVM42.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Yontoo.Installer
15.5.1.12

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.15429

Sophos
PUA 'Browse Fox'
5.13

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

VIPRE Antivirus
Threat.4150696
39676

File size:
511 KB (523,264 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\1plhblkxusg==4.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/10/2015 4:00:00 PM

Valid to:
1/11/2016 3:59:59 PM

Subject:
CN=Air Globe, O=Air Globe, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0C68EFA725DB8110CE807489DAC03553

File PE Metadata
Compilation timestamp:
12/5/2009 2:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:SXsKJd1s15AnQEiM2WS/G/8/3D0Fw/tN8dkmLtpHHHrh7q:ScKX64QEV5P8/z0FmcLbH1q

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9779

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file 1plhblkxusg==4.exe has been seen being distributed by the following URL.

Remove 1plhblkxusg==4.exe - Powered by Reason Core Security