Alternative Flash Player Auto-Updater.exe

Flash Player Auto-Updater

Jonas Zimmermann

The application Alternative Flash Player Auto-Updater.exe, “Alternative Flash Player Auto-Updater” by Jonas Zimmermann has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address pxc-coding.com on port 80 using the HTTP protocol.
Publisher:
pXc-coding.com  (signed by Jonas Zimmermann)

Product:
Flash Player Auto-Updater

Description:
Alternative Flash Player Auto-Updater

Version:
1.2.0.1

MD5:
59a33fe1d70114d4d4cf63afbce2384d

SHA-1:
ef705119da4895801862e32fe8e9b9dd32f073b3

SHA-256:
654989b671080e2010bf2164857ce244bf51e914243dfd9015154d3f78edbb2c

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/25/2024 4:43:27 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.JonasZim (M)
16.3.27.4

File size:
521.7 KB (534,216 bytes)

Product version:
1.2.0.1

Copyright:
Copyright © pXc-coding.com

Original file name:
Alternative Flash Player Auto-Updater.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\alternative flash player auto-updater\alternative flash player auto-updater.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
9/1/2015 7:00:00 AM

Valid to:
9/1/2017 6:59:59 AM

Subject:
CN=Jonas Zimmermann, OU=Individual Developer, O=No Organization Affiliation, L=Lueneburg, S=Lower Saxony, C=DE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
4B7CBA9F39D1835F3A0E31785E8054F7

File PE Metadata
Compilation timestamp:
1/25/2016 3:14:24 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:tK51zAwWL+airDER6etrIA1o17etrIA1o1LetrIA1o18IfetrIA1o1pOQ:UI6gEA1o17gEA1o1LgEA1o18IfgEA1oL

Entry address:
0x691BE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, 00, 03, 00, 00, 00, 30, 00, 00, 80, 0E, 00, 00, 00, 68, 00, 00, 80, 10, 00, 00, 00, 80, 00, 00, 80, 18, 00, 00, 00, 98, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.4494

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
412.5 KB (422,400 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to pxc-coding.com  (138.201.16.11:80)

TCP (HTTP):
Connects to a23-15-152-194.deploy.static.akamaitechnologies.com  (23.15.152.194:80)

TCP (HTTP):
Connects to a23-219-134-115.deploy.static.akamaitechnologies.com  (23.219.134.115:80)

TCP (HTTP):
Connects to a23-53-208-206.deploy.static.akamaitechnologies.com  (23.53.208.206:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-76-104-90.deploy.static.akamaitechnologies.com  (104.76.104.90:80)

TCP (HTTP):
Connects to a23-11-147-250.deploy.static.akamaitechnologies.com  (23.11.147.250:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-124-234-187.deploy.static.akamaitechnologies.com  (104.124.234.187:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-37-131-114.deploy.static.akamaitechnologies.com  (23.37.131.114:80)

TCP (HTTP):

Remove Alternative Flash Player Auto-Updater.exe - Powered by Reason Core Security