flvblaster.exe

appbundler.com

This is a component for the Pinball ad-supported platform which may deliver advertisemenst to the web browser in the form of banner and text ads. The application flvblaster.exe by appbundler.com has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. The file has been seen being downloaded from a.9monthsafter.com.
Publisher:
appbundler.com  (signed and verified)

Description:
Setup

Version:
3.0.113.3

MD5:
d1b094c8f0747f710566b25e6f83bd81

SHA-1:
f4b2e1d62e1e1a07df8c125e60f697abb4197729

SHA-256:
dd8e12e519da3a93f4c6b348cf854b557629dedc71459106d8792e6d3c3786d9

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/18/2024 4:14:47 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Pinball.appbundler.Installer (M)
16.1.17.0

File size:
341.7 KB (349,872 bytes)

Product version:
3.0.113.3

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flvblaster.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/10/2012 1:00:00 AM

Valid to:
1/10/2015 12:59:59 AM

Subject:
CN=appbundler.com, OU=Ops, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=appbundler.com, L=Bellevue, S=Washington, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
12E277DA6E659BFE14CD01F5A2AA95C5

File PE Metadata
Compilation timestamp:
2/22/2013 6:21:16 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:qfZ/nwzIhoZib9i0ju9BKVoEZUW7Q4Yqc9vGr3Gv2/xzqmCi0B:qfpPOZiBiq3zxJcJGrWv2/lqHn

Entry address:
0xBC2D0

Entry point:
60, BE, 00, A0, 46, 00, 8D, BE, 00, 70, F9, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
332 KB (339,968 bytes)

The file flvblaster.exe has been seen being distributed by the following URL.

Remove flvblaster.exe - Powered by Reason Core Security