73fd8c4a-777b-4b30-849d-96804a506ff7.exe

Torpedo

Berserk Group

Part of the Crossrider framework, a web browser extension that will deliver advertisements such as coupons, price-comparisons, display media, affiliate links, banners, popups/popunders and other links. The application 73fd8c4a-777b-4b30-849d-96804a506ff7.exe by Berserk Group has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
Berserk Group  (signed and verified)

Product:
Torpedo

Version:
1.0.0.0

MD5:
9e206f9512fd8a0a5ba27813cf544be5

SHA-1:
6151cc65491527297683fb97486fa8ff3b7535bb

SHA-256:
92d56c467d96cc50eb52509f7e7aee76040afbd3aab79ea9da9721a833ecd2c5

Scanner detections:
1 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
5/25/2020 6:56:29 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Crossrider (M)
17.3.8.9

File size:
31.4 KB (32,152 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2014

Original file name:
TorpedoCh.exe

File type:
Executable application (Win32 EXE)

Language:
Turkish (Turkey)

Common path:
C:\Program Files\cinem4s-2.1\73fd8c4a-777b-4b30-849d-96804a506ff7.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/14/2014 3:00:00 AM

Valid to:
8/15/2015 2:59:59 AM

Subject:
CN=Berserk Group, O=Berserk Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
58761EBCDB730A1C637A95BCB768285A

File PE Metadata
Compilation timestamp:
8/18/2014 3:08:19 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x81EE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 68, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
24.5 KB (25,088 bytes)

Scheduled Task
Task name:
temp_73fd8c4a-777b-4b30-849d-96804a506ff7


Remove 73fd8c4a-777b-4b30-849d-96804a506ff7.exe - Powered by Reason Core Security