f.exe

setup

OutBrowse

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application f.exe by OutBrowse has been detected as adware by 37 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. The setup routine uses the RevenYou.Com Pay Per Install platform (OutBrowse) which bundles additional software offers inclduing toolbars, extensions, PC utilities as well as other PUPs. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address unknown.prolexic.com on port 80 using the HTTP protocol.
Publisher:
@  (signed by OutBrowse)

Product:
setup

Description:
setup_file

Version:
4.0.0.3

MD5:
31a5ec2d13cfa575fab843164163f093

SHA-1:
6c4bea15f2a864e8c0bb467b369c1607aded4594

SHA-256:
76aceaf88844c4f89763a1fc50ab90871aa08e9e770c697655334cfe26b35e3c

Scanner detections:
37 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/19/2024 2:31:15 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.E
922

Agnitum Outpost
Win32.Sality.L
7.1.1

AhnLab V3 Security
Win32/Sality.F
2014.07.27

Avira AntiVirus
APPL/Downloader.Gen
7.11.153.56

avast!
Win32:Sality-AB
2014.9-140727

AVG
OutBrowse
2015.0.3452

Baidu Antivirus
Virus.Win32.Sality.$l
4.0.3.14727

Bitdefender
Win32.Sality.E
1.0.20.1040

Clam AntiVirus
W32.Sality.N
0.98/19168

Comodo Security
Virus.Win32.Sality.L
18989

Dr.Web
Adware.Bho.4035, Win32.Sector.20480
9.0.1.0208

Emsisoft Anti-Malware
Win32.Sality
8.14.07.27.03

ESET NOD32
Win32/OutBrowse (variant)
8.9899

Fortinet FortiGate
W32/Sality.P
7/27/2014

F-Prot
W32/Sality.K
v6.4.6.5.141

F-Secure
Win32.Sality.E
11.2014-27-07_1

G Data
Win32.Sality
14.7.24

IKARUS anti.virus
PUP.OutBrowse
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.181.12846

Kaspersky
Virus.Win32.Sality
14.0.0.3497

McAfee
W32/Sality.n
5600.7056

Microsoft Security Essentials
Threat.Undefined
1.179.1221.0

MicroWorld eScan
Win32.Sality.E
15.0.0.624

NANO AntiVirus
Virus.Win32.Sality.cdbf
0.28.2.60990

nProtect
Win32.Sality.E
14.07.25.01

Panda Antivirus
W32/Sality.O
14.07.27.03

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.K
7.14.14.00

Reason Heuristics
PUP.Installer.OutBrowse.B
14.8.7.20

Rising Antivirus
PE:Win32.Sality!214858
23.00.65.14725

Sophos
OutBrowse
4.98

Total Defense
Win32/Sality.J
37.0.11083

Trend Micro House Call
PE_SALITY.AE
7.2.208

Trend Micro
PE_SALITY.AE
10.465.27

Vba32 AntiVirus
Win32.HLLP.Kuku.304
3.12.26.3

VIPRE Antivirus
OutBrowse
29974

ViRobot
Win32.Sality.G
2011.4.7.4223

File size:
1.3 MB (1,391,216 bytes)

Product version:
4.0.0.1

Copyright:
(c) All+rights+reserved.

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\f.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/24/2013 1:00:00 AM

Valid to:
10/25/2014 12:59:59 AM

Subject:
CN=OutBrowse, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=OutBrowse, L=Ramat Gan, S=Ramat Gan, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
56A6FE571611B68C9224798AD62913CA

File PE Metadata
Compilation timestamp:
6/5/2014 11:58:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:EsZa1RLq//FzpbDzti3rQ88cxCNJkG85xwXo2LrjzNBCqm:EZ9KtpDVfNeR52XJLrjzNBCqm

Entry address:
0xF14EF

Entry point:
E8, 40, AD, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 8B, FF, 55, 8B, EC, 83, EC, 18, 53, 8B, 5D, 0C, 56, 8B, 73, 08, 33, 35, AC, 4E, 53, 00, 57, 8B, 06, C6, 45, FF, 00, C7, 45, F4, 01, 00, 00, 00, 8D, 7B, 10, 83, F8, FE, 74, 0D, 8B, 4E, 04, 03, CF, 33, 0C, 38, E8, 0C, 98, FF, FF, 8B, 4E, 0C, 8B, 46, 08, 03, CF, 33, 0C, 38, E8, FC, 97, FF, FF, 8B, 45, 08, F6, 40, 04, 66, 0F, 85, 19, 01, 00, 00, 8B, 4D, 10, 8D, 55, E8, 89, 53, FC, 8B, 5B, 0C, 89, 45, E8, 89, 4D, EC, 83, FB, FE, 74, 5F, 8D, 49...
 
[+]

Code size:
1.1 MB (1,104,896 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to unknown.prolexic.com  (72.52.4.90:80)

TCP (HTTP):
Connects to qh-in-f95.1e100.net  (74.125.22.95:80)

TCP (HTTP):
Connects to qh-in-f154.1e100.net  (74.125.22.154:80)

TCP (HTTP):
Connects to qd-in-f95.1e100.net  (64.233.171.95:80)

TCP (HTTP):
Connects to qd-in-f155.1e100.net  (64.233.171.155:80)

TCP (HTTP):
Connects to qb-in-f156.1e100.net  (173.194.204.156:80)

TCP (HTTP):
Connects to qb-in-f154.1e100.net  (173.194.204.154:80)

TCP (HTTP):

TCP (HTTP):
Connects to ec2-54-235-200-123.compute-1.amazonaws.com  (54.235.200.123:80)

TCP (HTTP):
Connects to ec2-107-21-247-138.compute-1.amazonaws.com  (107.21.247.138:80)

TCP (HTTP):
Connects to a92-122-48-90.deploy.akamaitechnologies.com  (92.122.48.90:80)

Remove f.exe - Powered by Reason Core Security