brothersoft_downloader_for_project_blackout.exe

BSdownloader Module

KORAM GAMES LIMITED

The application brothersoft_downloader_for_project_blackout.exe by KORAM GAMES LIMITED has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address 49.14.7e4b.ip4.static.sl-reverse.com on port 80 using the HTTP protocol.
Publisher:
KORAM GAMES LIMITED  (signed and verified)

Product:
BSdownloader Module

Version:
1, 0, 0, 3

MD5:
a20999fdb9c24297b68f6e8b3a334da7

SHA-1:
6155b5ca8fb72a3ed9ff3e70cf8b18952fe41e8d

SHA-256:
d1ff6cdefbc835b64ce87eacede735b15d222c232aac23d7a77d9a1f349a3b54

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
2/18/2017 12:06:08 PM UTC  (nine months ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.KORAM (M)
17.2.18.7

File size:
659.7 KB (675,560 bytes)

Product version:
1, 0, 0, 3

Copyright:
Copyright 2011

Original file name:
BSdownloader.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\brothersoft_downloader_for_project_blackout.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/10/2014 7:00:00 AM

Valid to:
2/9/2017 6:59:59 AM

Subject:
CN=KORAM GAMES LIMITED, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=KORAM GAMES LIMITED, L=HongKong, S=HongKong, C=HK

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
53B6BD34F6B702DEC3C291D72E678EEF

File PE Metadata
Compilation timestamp:
5/15/2014 7:55:08 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0x7CC0B

Entry point:
E8, 05, 05, 00, 00, E9, 37, FD, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 55, 33, FF, 33, ED, 8B, 44, 24, 14, 0B, C0, 7D, 15, 47, 45, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 28, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, F0, 8B, C3, F7, 64, 24, 18, 8B, C8, 8B, C6, F7, 64, 24, 18, 03, D1, EB...
 
[+]

Code size:
505 KB (517,120 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to 49.14.7e4b.ip4.static.sl-reverse.com  (75.126.20.73:80)