dcbrakieamo_amobl_setup.exe

BrowserAir (GOOBZO LTD)

The application dcbrakieamo_amobl_setup.exe by BrowserAir (GOOBZO) has been detected as adware by 12 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. It runs as a scheduled task under the Windows Task Scheduler. While running, it connects to the Internet address server-205-251-251-152.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
BrowserAir (GOOBZO LTD)  (signed and verified)

Version:
2.11.0.999

MD5:
5d571c776c653df1a45c9d76d259c1f5

SHA-1:
59f94664cf8eb29b071b19ce4d3e80aa9e7a9726

SHA-256:
511335c562b72a918eb56d34ce24c0ab4fd6bb155394d48023ab5d58748cac4f

Scanner detections:
12 / 68

Status:
Adware

Analysis date:
4/26/2024 2:30:20 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Symmi.54708
542

Arcabit
Trojan.Symmi.DD5B4
1.0.0.425

Bitdefender
Gen:Variant.Symmi.54708
1.0.20.1120

Bkav FE
HW32.Packed
1.3.0.7062

Emsisoft Anti-Malware
Gen:Variant.Symmi.54708
8.15.08.12.12

F-Secure
Gen:Variant.Symmi.54708
11.2015-12-08_4

G Data
Gen:Variant.Symmi.54708
15.8.25

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1595

Malwarebytes
PUP.Optional.BrowserAir.C
v2015.08.12.12

MicroWorld eScan
Gen:Variant.Symmi.54708
16.0.0.672

Panda Antivirus
Adware/Goobzo
15.08.12.12

Reason Heuristics
PUP.Goobzo.Installer (M)
15.8.12.0

File size:
2.2 MB (2,336,152 bytes)

Product version:
2.11.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\installer\install_1179\dcbrakieamo_amobl_setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
2/10/2015 5:00:00 PM

Valid to:
2/11/2016 4:59:59 PM

Subject:
CN=BrowserAir (GOOBZO LTD), O=BrowserAir (GOOBZO LTD), STREET="Bldg #15 Matam", L=Haifa, S=Haifa, PostalCode=31905, C=IL

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3B4F9A8B40F303C8AAD1D77B2A2B4674

File PE Metadata
Compilation timestamp:
8/5/2015 11:55:48 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
49152:iKaNQLXmqsADS9A/X+KPNoIhVhQTTA/elT9FWCNSAkNN7RANZ:ANQqhWhhV64/elTTWqK7GNZ

Entry address:
0x3032D8

Entry point:
E9, 0D, 26, 00, 00, 16, 60, 00, 59, 09, 20, 66, 3E, 84, EC, CF, FF, 9C, 29, 01, 40, 46, C5, 3C, 11, 09, 2C, 1C, FD, 15, 88, F7, AB, 7C, 60, C0, 75, C5, 40, FF, 9C, 2D, 47, B5, 04, 6E, D0, DF, F9, 87, 29, E6, CB, 06, FC, FF, CF, 41, 83, 67, 65, C1, 79, B0, C9, 0C, D6, 32, 7C, AC, 99, 96, 2E, 84, E3, 8B, 7E, 34, FD, C7, 26, AC, 1C, 68, 6A, A8, FE, 24, DA, 79, 83, E1, 78, 7B, 49, 53, 31, BE, 4C, 6C, E2, A3, E4, 0F, 2C, F4, 62, C8, 68, 0A, D8, FE, 92, 2E, 27, 82, 75, 4F, 51, 68, D4, DD, 47, CA, DF, 1A, C9, AF...
 
[+]

Entropy:
7.8961

Packer / compiler:
Xtreme-Protector v1.05

Code size:
549.5 KB (562,688 bytes)

Scheduled Task
Task name:
Inst_Rep

Trigger:
Registration (Runs on registration)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-205-251-251-201.jfk5.r.cloudfront.net  (205.251.251.201:80)

TCP (HTTP):
Connects to server-205-251-251-152.jfk5.r.cloudfront.net  (205.251.251.152:80)

Remove dcbrakieamo_amobl_setup.exe - Powered by Reason Core Security