icloudactivationlockbypass2016__7934_il75125.exe

Konstrakt IT, TOV

The application icloudactivationlockbypass2016__7934_il75125.exe by Konstrakt IT, TOV has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
@Setup  (signed by Konstrakt IT, TOV)

Description:
@Setup

Version:
11.21.21.11

MD5:
b51829495bf26361afd41a7ff15dcc9e

SHA-1:
0f072d758f6eb70532a89b870b29b0be8667d2ac

SHA-256:
1699523ff40dceb47b79fa50f0ff4f8c8a661d10111c16d4473e8a0f5aa05ebc

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/29/2024 9:09:41 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Amonetize.KonstraktITTOV.Installer (M)
16.2.16.14

File size:
885.2 KB (906,450 bytes)

Product version:
11.21.21.11

Original file name:
Setup.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\icloudactivationlockbypass2016__7934_il75125.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
2/10/2016 12:00:00 AM

Valid to:
2/9/2017 11:59:59 PM

Subject:
CN="Konstrakt IT, TOV", OU=IT, O="Konstrakt IT, TOV", STREET=Bud. 83 vul.Saksaganskogo, L=Kiev, S=Kiev, PostalCode=01033, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
21BE6176ECE3C9D399811B5DEE6A06BC

File PE Metadata
Compilation timestamp:
2/14/2016 8:14:29 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:Wk2I1TtLTa+hfATMMb0n2DZgBnBbfDpOq1GvwUOUsPB3vF:WPI1TtLTa+hSfo2DZYVfDp/1qsPBN

Entry address:
0x7AF3

Entry point:
E8, 1D, 44, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, 55, 8B, EC, 57, 56, 8B, 75, 0C, 8B, 4D, 10, 8B, 7D, 08, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, A0, 01, 00, 00, 81, F9, 80, 00, 00, 00, 72, 1C, 83, 3D, 80, 5F, 42, 00, 00, 74, 13, 57, 56, 83, E7, 0F, 83, E6, 0F, 3B, FE, 5E, 5F, 75, 05, E9, F7, 05, 00, 00, F7, C7, 03, 00, 00, 00, 75, 14, C1, E9, 02, 83, E2, 03, 83, F9, 08, 72, 29, F3, A5, FF, 24, 95, 70, 7C, 40, 00, 8B, C7, BA, 03, 00, 00, 00, 83, E9, 04, 72, 0C, 83, E0, 03, 03, C8, FF, 24...
 
[+]

Entropy:
7.8732  (probably packed)

Code size:
103.5 KB (105,984 bytes)

The file icloudactivationlockbypass2016__7934_il75125.exe has been seen being distributed by the following URL.