downloader.63399.exe

WindApp

NOSIBAY

The application downloader.63399.exe by NOSIBAY has been detected as a potentially unwanted program by 8 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from it-cdn.windapp.net and multiple other hosts. While running, it connects to the Internet address server-54-230-8-4.lhr3.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
NOSIBAY  (signed and verified)

Product:
WindApp

Version:
3.0.673.0.63399

MD5:
e84331b913bfbf484f3151e299ddb0f4

SHA-1:
8d949789288d8a49bf257a1d650cb9fea5655b83

SHA-256:
157cb6fd6641721b343f6175edb46803000eafe4c28d1cd8f1cfdec341f478bb

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
4/30/2024 6:17:08 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2016.0.3057

Bkav FE
W32.HfsAdware
1.3.0.6979

Dr.Web
Adware.Downware.10519
9.0.1.0187

Malwarebytes
PUP.Optional.Nosibay.A
v2015.07.06.07

Panda Antivirus
PUP/Nosibay
15.07.06.07

Reason Heuristics
PUP.NOSIBAY.Installer (M)
15.7.6.7

Rising Antivirus
PE:Trojan.Win32.Generic.18763188!410399112
23.00.65.15704

VIPRE Antivirus
BubbleDock
41694

File size:
174 KB (178,224 bytes)

Copyright:
© Store

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\zu4azlmw\downloader.63399.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
9/24/2014 8:00:00 PM

Valid to:
12/25/2015 6:59:59 PM

Subject:
CN=NOSIBAY, OU=Secure Application Development, O=NOSIBAY, L=PEROLS, S=Hérault, C=FR

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
52E368957AD1C7202A103C7CFD7BD6C2

File PE Metadata
Compilation timestamp:
12/5/2009 5:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:cQIURTXJv45uXkg3cqMhIqa2TlJhu934xtxpGbZaR2VsBjIhpUwxnpKD2ds1:cs93kgs5nl5uFm4ZaRZjMpUwxpKQ2

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.7560

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file downloader.63399.exe has been seen being distributed by the following 6 URLs.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to server-54-230-8-4.lhr3.r.cloudfront.net  (54.230.8.4:80)

Remove downloader.63399.exe - Powered by Reason Core Security