a0089608.exe

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application a0089608.exe by Jump Flip has been detected as adware by 19 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. While running, it connects to the Internet address install.jumpflip.net on port 80 using the HTTP protocol.
Publisher:
Jump Flip  (signed and verified)

Version:
1.0.0.0

MD5:
d8f09151025ad1ed791fe2e9a9e7a272

SHA-1:
025aeaa5aee4ecc9b7da1f1e5d5d1e60ce3cb4c9

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 7:25:16 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
APPL/BrowseFox.Gen4
7.11.183.48

avast!
Win32:BrowseFox-BV [PUP]
2014.9-151125

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.151125

Comodo Security
UnclassifiedMalware
19997

Dr.Web
Trojan.BPlug.203
9.0.1.0329

ESET NOD32
MSIL/BrowseFox (variant)
9.10672

Fortinet FortiGate
Adware/Kranet
11/25/2015

G Data
Win32.Trojan.Agent.DDABO9
15.11.24

IKARUS anti.virus
PUA.MSIL.BrowseFox
t3scan.1.8.3.0

K7 AntiVirus
Trojan
13.185.13888

Kaspersky
not-a-virus:HEUR:AdWare.MSIL.Kranet
14.0.0.1068

McAfee
BrowseFox.b
5600.6571

Quick Heal
AdWare.MSIL.r3 (Not a Virus)
11.15.14.00

Reason Heuristics
PUP.Yontoo.JumpFlip (M)
15.11.25.11

Rising Antivirus
PE:Trojan.Win32.Generic.176EBF55!393133909
23.00.65.151123

Sophos
Generic PUA AC
4.98

Trend Micro
TROJ_GEN.R047C0PJA14
10.465.25

VIPRE Antivirus
Yontoo
34522

File size:
157.3 KB (161,056 bytes)

Product version:
1.0.0.0

Original file name:
JumpFlip.BRT.Helper.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\panda security\panda cloud antivirus\lostandfound\a0089608.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/21/2013 7:00:00 PM

Valid to:
8/22/2015 6:59:59 PM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
9/17/2014 2:25:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
3072:F0ilxBWuBONrHX1ay1zZPit7YRZQXfGE83dCUyzU1G:F0i7UrHX1v1zZPbRZWfGEcd8UQ

Entry address:
0x270F2

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1305

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
148.5 KB (152,064 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to install.jumpflip.net  (70.186.131.184:80)

Remove a0089608.exe - Powered by Reason Core Security