boozaka.purbrowse64.exe

BooZaka

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application boozaka.purbrowse64.exe by BooZaka has been detected as adware by 19 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
BooZaka  (signed and verified)

MD5:
270c896035d0b5e072398c04d53d09e7

SHA-1:
a7ccc262915bbcdb0a2cdeedb2b8e8913492e1f4

SHA-256:
1a7d07f1c786b728fac0faed4512f15f21d8077cf61063a7ced693a0812ca01a

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 5:23:32 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.AM
791

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2014.09.20

avast!
Win64:BrowseFox-A [PUP]
2014.9-140923

AVG
Generic
2015.0.3342

Baidu Antivirus
Adware.Win64.BrowseFox
4.0.3.14923

Bitdefender
Adware.SwiftBrowse.AM
1.0.20.1695

Clam AntiVirus
Win.Adware.Swiftbrowse-279
0.98/19422

Emsisoft Anti-Malware
Adware.SwiftBrowse.AM
8.14.12.05.12

ESET NOD32
Win64/BrowseFox.A potentially unwanted application
8.7.0.302.0

F-Secure
Adware.SwiftBrowse.AM
11.2014-05-12_6

G Data
Adware.SwiftBrowse.AM
14.12.24

herdProtect (fuzzy)
2014.12.5.17

IKARUS anti.virus
PUA.BrowseFox
t3scan.1.7.8.0

MicroWorld eScan
Adware.SwiftBrowse.AM
15.0.0.1017

nProtect
Adware.SwiftBrowse.AM
14.09.12.01

Reason Heuristics
PUP.BooZaka.S
14.9.23.13

Sophos
PUA.Browse Fox
55

VIPRE Antivirus
Threat.4741131
32938

File size:
341.8 KB (349,976 bytes)

File type:
Executable application (Win64 EXE)

Common path:
C:\Program Files\boozaka\bin\boozaka.purbrowse64.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/18/2014 5:00:00 PM

Valid to:
3/19/2015 4:59:59 PM

Subject:
CN=BooZaka, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=BooZaka, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
798D14F2EA94D165A332BEEBA73F4EE8

File PE Metadata
Compilation timestamp:
9/9/2014 2:53:44 PM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows Console

Linker version:
10.0

CTPH (ssdeep):
6144:dmTV6EBlub61yGYZW+WpVdDhiIqqoPPBFvueqTlbk5C/QDV0wU7YBTBhxOsr/NIG:duV6Mub6YW/pV9W9TvKjZ7YBTXcyre2

Entry address:
0x25110

Entry point:
48, 83, EC, 28, E8, 77, 94, 00, 00, 48, 83, C4, 28, E9, 76, FE, FF, FF, CC, CC, 4C, 8D, 0D, 25, A5, 02, 00, 33, C0, 49, 8B, D1, 44, 8D, 40, 08, 3B, 0A, 74, 2B, FF, C0, 49, 03, D0, 83, F8, 2D, 72, F2, 8D, 41, ED, 83, F8, 11, 77, 06, B8, 0D, 00, 00, 00, C3, 81, C1, 44, FF, FF, FF, B8, 16, 00, 00, 00, 83, F9, 0E, 41, 0F, 46, C0, C3, 48, 98, 41, 8B, 44, C1, 04, C3, CC, 48, 83, EC, 28, E8, DB, 5E, 00, 00, 48, 85, C0, 75, 09, 48, 8D, 05, 37, A6, 02, 00, EB, 04, 48, 83, C0, 10, 48, 83, C4, 28, C3, 48, 83, EC, 28...
 
[+]

Entropy:
6.2947

Code size:
230.5 KB (236,032 bytes)

Remove boozaka.purbrowse64.exe - Powered by Reason Core Security