f_0006e4

aTube Catcher

DsNET Corp.

The file f_0006e4 by DsNET has been detected as a potentially unwanted program by 8 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. The file has been seen being downloaded from lfiles3.brothersoft.com and multiple other hosts.
Publisher:
DsNET Corp  (signed by DsNET Corp.)

Product:
aTube Catcher

Version:
2.9.1025

MD5:
855077b863023aef72fe7357356f70fa

SHA-1:
01baec6dd8dd8156fe5e840d49d3112e93e404d9

SHA-256:
0fbd13fa08e9edafd40a521e592b1c80e8c36a3acae75566f370c7d355cbb9d7

Scanner detections:
8 / 68

Status:
Potentially unwanted

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
4/26/2024 3:35:11 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.OpenCandy
4.0.3.15117

Dr.Web
Adware.Toolbar.246
9.0.1.017

ESET NOD32
9.10769

G Data
Win32.Adware.OpenCandy
15.1.24

Malwarebytes
PUP.Optional.OpenCandy
v2015.01.17.11

Reason Heuristics
PUP.DsNET.aTube.Installer.Meta (M)
16.6.9.12

Rising Antivirus
PE:PUF.OpenCandy!1.9DE5
23.00.65.15115

Trend Micro House Call
HV_ZYX_BK082F62.TOMC
7.2.17

File size:
11.8 MB (12,323,864 bytes)

Product version:
2.9.1025

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\google\chrome\user data\default\cache\f_0006e4

Digital Signature
Signed by:

Authority:
The USERTRUST Network

Valid from:
3/7/2011 7:00:00 PM

Valid to:
3/7/2014 6:59:59 PM

Subject:
CN=DsNET Corp., O=DsNET Corp., STREET=Plan de Ayala M3 L30, STREET=Mexico Revolucionario, L=Ecatepec, S=Mexico, PostalCode=55266, C=MX

Issuer:
CN=UTN-USERFirst-Object, OU=http://www.usertrust.com, O=The USERTRUST Network, L=Salt Lake City, S=UT, C=US

Serial number:
009934C0F374A7790598E44428C2B46363

File PE Metadata
Compilation timestamp:
12/5/2009 5:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:k6JnHb9aEbFzEZcDJEkd6ycHYRaPuySi5qYmlOsiO0PyDSQqnejvSriWCa8G:X79bFoZ4JEccI+SNYmlOJzQpjvSrLZ

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9996

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file f_0006e4 has been seen being distributed by the following 3 URLs.

Remove f_0006e4 - Powered by Reason Core Security