dragon-oculto.exe

Daneil Jemoch

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application dragon-oculto.exe, “Installer for MountainApp” by Daneil Jemoch has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
MountainApp  (signed by Daneil Jemoch)

Product:
MountainApp

Description:
Installer for MountainApp

Version:
2014.6.12.1603

MD5:
99d38ee1280d3fbe387725f99e76a03e

SHA-1:
49101a572b6a04d08f622bf203554be00febf3b2

SHA-256:
e998d2929ff710740c0996d343f1fa288883dec41e3de93dedc75895c8ff8faa

Scanner detections:
29 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/24/2024 8:32:42 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.664932
920

Agnitum Outpost
Trojan.AntiFW
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.06.15

Avira AntiVirus
TR/Kazy.324119.27
7.11.154.222

avast!
Win32:InstalleRex-BO [PUP]
2014.9-140729

AVG
Generic
2015.0.3398

Bitdefender
Application.Generic.664932
1.0.20.1050

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.4959

Comodo Security
Application.Win32.InstalleRex.KG
18545

Dr.Web
Trojan.WebPick.2452
9.0.1.0210

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
8.7.0.302.0

F-Prot
W32/Trojan2.OENW
4.6.5.141

F-Secure
Application.Generic.664932
11.2014-29-07_3

G Data
Win32.Application.InstalleRex
14.7.24

IKARUS anti.virus
PUA.InstallBundler
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.181.12872

Kaspersky
Trojan.Win32.AntiFW
14.0.0.3486

Malwarebytes
PUP.Optional.InstalleRex
v2014.07.29.08

McAfee
PUP-FHQ
5600.7054

MicroWorld eScan
Application.Generic.664932
15.0.0.630

NANO AntiVirus
Riskware.Win32.InfoLeak.cvgqot
0.28.0.60253

Panda Antivirus
PUP/TSUploader
14.07.29.08

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
7.14.14.00

Reason Heuristics
Adware.WebPick.Installer.N
14.7.29.19

Sophos
MultiPlug
4.98

Vba32 AntiVirus
Downware.TSU
3.12.26.0

VIPRE Antivirus
Threat.4753027
29708

File size:
316.3 KB (323,856 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 MountainApp

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Common path:
C:\users\{user}\downloads\dragon-oculto.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/1/2013 7:00:00 PM

Valid to:
9/2/2014 6:59:59 PM

Subject:
CN=Daneil Jemoch, O=Daneil Jemoch, STREET=Dubenskay 3, L=Kiev, S=Kiev, PostalCode=03056, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49A39B9858F6FBAB7EFD6CE450878DDB

File PE Metadata
Compilation timestamp:
3/12/2013 2:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:Rr5bUzkuvcBYC47l2xhXcDp5xikxyI3rqrupq0FNhAna9iydforDv:RrqkuveY3fxikxyI7qSpBAna4ydfEv

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file dragon-oculto.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove dragon-oculto.exe - Powered by Reason Core Security