1pljatvnq53.exe

Air Globe

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application 1pljatvnq53.exe by Air Globe has been detected as adware by 23 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from install-cdn.airglobeapp.com.
Publisher:
Air Globe  (signed and verified)

MD5:
79277fed12d5493792ec4f076a494a78

SHA-1:
3f900d4f3d4b6e22a6b1d8e633fb1dc74eef50fa

SHA-256:
14940353378c7c5b1f4460703e0e165549e8e6134e3d63f0681b1b903807b525

Scanner detections:
23 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/1/2024 5:59:36 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.1
5816575

Avira AntiVirus
ADWARE/BrowseFox.Gen
3.6.1.96

AVG
Adware AdPlugin.CVG
2014.0.4311

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15410

Bitdefender
Gen:Variant.Adware.SwiftBrowse.1
1.0.20.500

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-34627
0.98/21511

Dr.Web
Trojan.Yontoo.1734
9.0.1.0100

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
9.0.0.4799

F-Secure
Gen:Variant.Adware.SwiftBrowse
11.2015-10-04_6

G Data
Gen:Variant.Adware.SwiftBrowse
15.4.25

herdProtect (fuzzy)
2015.7.13.10

K7 AntiVirus
Unwanted-Program
13.202.15557

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Kranet
15.0.0.543

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.1
16.0.0.300

NANO AntiVirus
Trojan.Nsis.BrowseFox.dnxihk
0.30.10.952

Norman
Gen:Variant.Adware.SwiftBrowse.1
03.12.2014 13:20:04

Qihoo 360 Security
Win32/Virus.Adware.639
1.0.0.1015

Reason Heuristics
PUP.Installer.Yontoo
15.4.10.15

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.15408

Sophos
PUA 'Browse Fox'
5.12

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

VIPRE Antivirus
Threat.4150696
38882

File size:
511 KB (523,280 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\1pljatvnq53.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/11/2015 1:00:00 AM

Valid to:
1/12/2016 12:59:59 AM

Subject:
CN=Air Globe, O=Air Globe, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0C68EFA725DB8110CE807489DAC03553

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:Of/ESY1s15AnQEiM2WS/G/8/3D0Fw/tN8dkmLtpHHHrh7Y:OnE564QEV5P8/z0FmcLbH1Y

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9778

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file 1pljatvnq53.exe has been seen being distributed by the following URL.

Remove 1pljatvnq53.exe - Powered by Reason Core Security