a0c003_p00f0r.rar.exe

Daneil Jemoch

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions using the JustPlug.it browser framework. The application a0c003_p00f0r.rar.exe, “Installer for TopApp software” by Daneil Jemoch has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The file has been seen being downloaded from forallhomee.com. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
TopApp software  (signed by Daneil Jemoch)

Product:
TopApp software

Description:
Installer for TopApp software

Version:
2014.5.22.1509

MD5:
a73c4d971b17bc722618dfbb2faa8e8f

SHA-1:
82bbf8dfb7738ecfdfa30777aa5478171f3ec6ac

SHA-256:
4b5467b8b2e739caedadb9c9eac8b8bb6ada2e0696da914dffd5c5643f363afe

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process, hosted on TusFiles.

Analysis date:
4/18/2024 11:38:16 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
Adware (M)
16.7.23.3

File size:
334.2 KB (342,264 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 TopApp software

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\a0c003_p00f0r.rar.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/2/2013 7:00:00 AM

Valid to:
9/3/2014 6:59:59 AM

Subject:
CN=Daneil Jemoch, O=Daneil Jemoch, STREET=Dubenskay 3, L=Kiev, S=Kiev, PostalCode=03056, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49A39B9858F6FBAB7EFD6CE450878DDB

File PE Metadata
Compilation timestamp:
3/12/2013 3:51:45 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:wrv3cibUzkuvcBYC47l2xWVgc1nvHZkc0dnyMqa0Y7bqTnsd:wrv3c7kuveY3nae5kc0dnrqa0Y3R

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9595

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file a0c003_p00f0r.rar.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=275271516&publisher_id=752&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=825814548&external_id=0&session_id=1651629096&hardware_id=1926900612&installer_file_name=a0c003_p00f0r.rar

Remove a0c003_p00f0r.rar.exe - Powered by Reason Core Security