HypeNet.BOAS.exe

HypeNet

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application HypeNet.BOAS.exe by HypeNet has been detected as adware by 9 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
HypeNet  (signed and verified)

Description:
HypeNet.BOAS.exe

Version:
1.0.0.1

MD5:
b2efe9234edee8a2df56bb6ca70e9e57

SHA-1:
1e5a601ae2859d3a6484b95a6e11b507801ff7ff

SHA-256:
d7564085285d328721f049e35a0aa3b23151e232f228e4c38cb2f5185ab0fe68

Scanner detections:
9 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/29/2024 8:20:48 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2014.10.07

AVG
Generic
2015.0.3341

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14925

ESET NOD32
Win32/BrowseFox (variant)
8.10521

herdProtect (fuzzy)
2014.12.7.5

IKARUS anti.virus
PUA.SmarterPower
t3scan.1.7.8.0

Reason Heuristics
PUP.HypeNet.L
14.9.25.8

VIPRE Antivirus
Threat.4741131
33706

File size:
1.7 MB (1,791,256 bytes)

Product version:
1.0.0.1

Original file name:
HypeNet.BOAS.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\hypenet\bin\hypenet.boas.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/9/2014 4:00:00 AM

Valid to:
1/10/2015 3:59:59 AM

Subject:
CN=HypeNet, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=HypeNet, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1FBAF70F51194AE01BD4FAB2931DA43A

File PE Metadata
Compilation timestamp:
9/24/2014 5:39:21 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
49152:B2CQu0a7IkGeqSH+sZeEsuRyLcr6sxyK4V7cuOcCTPbE5z7Pm2ICLk9iUoUyq22:Qqh7QeD+kguILcr6sxyK4V7cZbybm2IX

Entry address:
0x107789

Entry point:
E8, CA, 72, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, B8, 3E, 58, 00, 75, 02, F3, C3, E9, 51, 73, 00, 00, 8B, 41, 04, 85, C0, 75, 05, B8, F0, C6, 55, 00, C3, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 57, 8B, F9, 74, 2D, 56, FF, 75, 08, E8, 7A, 38, 00, 00, 8D, 70, 01, 56, E8, 1C, 06, 00, 00, 59, 59, 89, 47, 04, 85, C0, 74, 11, FF, 75, 08, 56, 50, E8, 17, 74, 00, 00, 83, C4, 0C, C6, 47, 08, 01, 5E, 5F, 5D, C2, 04, 00, 8B, FF, 56, 8B, F1, 80, 7E, 08, 00, 74, 09, FF, 76, 04, E8, FB, 09, 00, 00, 59, 83, 66, 04, 00, C6, 46...
 
[+]

Code size:
1.2 MB (1,263,104 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a88-221-132-206.deploy.akamaitechnologies.com  (88.221.132.206:80)

TCP (HTTP):
Connects to a88-221-132-190.deploy.akamaitechnologies.com  (88.221.132.190:80)

Remove HypeNet.BOAS.exe - Powered by Reason Core Security