installer_adobe_flash_player_english.exe

Zoobam

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application installer_adobe_flash_player_english.exe by Zoobam has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Zoobam  (signed and verified)

MD5:
2e49d6efc91a0bc39898e309b7cde90c

SHA-1:
1f665b0ad0a2ada773b8196282aec79a06188304

SHA-256:
19bfefd2e5297f2572a78bd2d58fad9aa6ec5a8e29883bcfb5e2067b7971a14c

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 4:20:15 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.KJ
5747774

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.06.18

Avira AntiVirus
ADWARE/Adware.Gen
7.11.30.172

Arcabit
Application.Bundler.KJ
1.0.0.425

avast!
Win32:Adware-CIX [PUP]
150602-1

AVG
Generic
2016.0.3075

Bitdefender
Application.Bundler.KJ
1.0.20.845

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/20578

Comodo Security
Application.Win32.DownloadAdmin.ANGL
22490

Dr.Web
Trojan.Vittalia.36
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.KJ
10.0.0.5366

ESET NOD32
Win32/DownloadAdmin.H potentially unwanted application
7.0.302.0

F-Prot
W32/S-92ce39bf
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.KJ
5.14.151

G Data
Application.Bundler.KJ
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16281

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.06.18.07

MicroWorld eScan
Application.Bundler.KJ
16.0.0.507

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.30.24.2086

Norman
Application.Bundler.KJ
02.06.2015 14:23:46

Reason Heuristics
PUP.Tightrope.Bundler
15.6.18.3

Sophos
PUA 'DownloadAdmin' (of type Adware)
5.15

Total Defense
Win32/Tnega.IQCCUAC
37.1.62.1

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4150696
40830

Zillya! Antivirus
Backdoor.PePatch.Win32.66161
2.0.0.2233

File size:
825.3 KB (845,056 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Common path:
C:\Program Files\adobe\adobe flash player\installer_adobe_flash_player_english.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
10/16/2014 4:27:59 AM

Valid to:
10/16/2017 4:27:59 AM

Subject:
CN=Zoobam, O=Zoobam, L=Kirkland, S=Washington, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EA9D31E75E043

File PE Metadata
Compilation timestamp:
7/15/2014 6:29:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:xxpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8SK:Dp9sVuaVdvgVbmgGDijyikg5K

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to st-sh-us-dc3-002.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-53-91.jfk6.r.cloudfront.net  (54.230.53.91:80)

TCP (HTTP):
Connects to server-54-230-52-248.jfk6.r.cloudfront.net  (54.230.52.248:80)

TCP (HTTP):
Connects to server-54-192-55-183.jfk6.r.cloudfront.net  (54.192.55.183:80)

TCP (HTTP):
Connects to server-54-192-55-160.jfk6.r.cloudfront.net  (54.192.55.160:80)

TCP (HTTP):
Connects to server-54-192-54-185.jfk6.r.cloudfront.net  (54.192.54.185:80)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.14.72:443)

TCP (HTTP):
Connects to ns237133.ovh.net  (37.59.34.142:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)

Remove installer_adobe_flash_player_english.exe - Powered by Reason Core Security