ef8f7138892f2c445a400157d5c56d70.pe

Roll Around

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file ef8f7138892f2c445a400157d5c56d70.pe by Roll Around has been detected as adware by 19 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Roll Around  (signed and verified)

Version:
1.0.5548.40647

MD5:
ef8f7138892f2c445a400157d5c56d70

SHA-1:
f6c675c3255c98430a4d23a4b7df29536e45e68b

SHA-256:
f937b13a6baf664594c38dd6026d995ba0131d44fde3db25903b8f262b1c7cdc

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/2/2024 11:56:33 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.03.28

Avira AntiVirus
ADWARE/BrowseFox.Gen
3.6.1.96

AVG
BrowseFox
2016.0.3135

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15418

Dr.Web
Trojan.Yontoo.1738
9.0.1.0108

ESET NOD32
Win32/BrowseFox.AI potentially unwanted (variant)
9.11312

Fortinet FortiGate
Riskware/BrowseFox
4/18/2015

herdProtect (fuzzy)
2015.7.20.12

IKARUS anti.virus
AdWare.BrowseFox
t3scan.1.8.9.0

K7 AntiVirus
Unwanted-Program
13.202.15407

McAfee
Artemis!EF8F7138892F
5600.6791

NANO AntiVirus
Trojan.Win32.Yontoo.dplwcp
0.30.8.659

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Yontoo.RollAround
15.4.18.17

Rising Antivirus
PE:Malware.BrowseFox!6.2103
23.00.65.15416

Sophos
Generic PUA PG
4.98

Trend Micro House Call
Suspicious_GEN.F47V0320
7.2.108

VIPRE Antivirus
Yontoo
38830

File size:
551.3 KB (564,496 bytes)

Product version:
1.0.5548.40647

Language:
English (United States)

Common path:
C:\users\{user}\downloads\ef8f7138892f2c445a400157d5c56d70.pe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/21/2014 4:00:00 PM

Valid to:
12/22/2015 3:59:59 PM

Subject:
CN=Roll Around, O=Roll Around, L=Los Angeles, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
02A1223E320B2EC6C2C8789B5CB4BB4B

File PE Metadata
Compilation timestamp:
3/11/2015 10:35:05 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:pHoI23d0PD8Av4FUUPPsjp11eBMJ+AT5ttek+3wfvgebS:RG88Av4mUnm1HIaxA3CvPb

Entry address:
0x34669

Entry point:
E8, F7, 1C, 01, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 38, 79, 48, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 78, 27, 48, 00, 01, 0F, 82, E9, 1D, 01, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10...
 
[+]

Entropy:
6.5526

Code size:
425 KB (435,200 bytes)

Remove ef8f7138892f2c445a400157d5c56d70.pe - Powered by Reason Core Security