icreinstall_dns-jumper_mv_dm.exe

Moca Funnel (Fried Cookie Ltd.)

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_dns-jumper_mv_dm.exe by Moca Funnel (Fried Cookie) has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
Moca Funnel (Fried Cookie Ltd.)  (signed and verified)

MD5:
d8b86997b2883846bc7e5a16aaed534f

SHA-1:
80b097ecddd3c931a5e257100ef443b645ef66ed

SHA-256:
50060fbe9768bebfc07784db449c24ca433f9c46d64249c7f4716d72a69cc4e4

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/25/2024 9:35:37 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.188.80

AVG
Generic
2015.0.3282

Comodo Security
ApplicUnwnt
20315

Dr.Web
Trojan.InstallCore.24
9.0.1.092

ESET NOD32
Win32/InstallCore.RO potentially unwanted application
7.0.302.0

K7 AntiVirus
Unwanted-Program
13.186.14280

Qihoo 360 Security
Win32/Virus.Adware.58c
1.0.0.1015

Reason Heuristics
PUP.Installer.InstallCore
15.4.11.23

Sophos
Generic PUA PC
4.98

VIPRE Antivirus
Threat.4786018
35010

File size:
744.3 KB (762,160 bytes)

Product version:
1.5

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_dns-jumper_mv_dm.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
10/27/2014 12:24:29 PM

Valid to:
10/24/2015 10:34:23 AM

Subject:
CN=Moca Funnel (Fried Cookie Ltd.), O=Moca Funnel (Fried Cookie Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11217FD85160553D3687E0331989956953F1

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:pgHprM4xROHfpNv3KHHnoXVh9Bzn/xTJxZ0DOVOYEzaWrHa6OeMBd5SeW92rI:pgHd/OHfpQHQh3zZLZ0DfmWr6CohWgI

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

Remove icreinstall_dns-jumper_mv_dm.exe - Powered by Reason Core Security