iroot.exe

Salyutem Plyus LLC

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application iroot.exe by Salyutem Plyus has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. According to AVG, this software downloads additional adware offers during setup. The file has been seen being downloaded from get.down1210tech.info.
Publisher:
Salyutem Plyus LLC  (signed and verified)

MD5:
aec69db3d14960133064bbd98fbacfd0

SHA-1:
0821513aa3d89eaf76062ed9d79df296bb2815c1

SHA-256:
284057c27ec1595869ca56a8f9f4619aa5b3a40ae00b06d350f751d7e9e655b5

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
5/12/2024 1:17:21 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.OutBrowse
2015.01.14

Avira AntiVirus
W32/Ramnit.A
7.11.30.172

AVG
Potentially harmful program Downloader.CZR
2014.0.4253

Dr.Web
Trojan.OutBrowse.55
9.0.1.05190

ESET NOD32
Win32/OutBrowse.BS potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/OutBrowse
1/13/2015

IKARUS anti.virus
PUA.OutBrowse
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.191.14625

Malwarebytes
PUP.Optional.OutBrowse
v2015.01.13.09

McAfee
Program.Adware-OutBrowse.d
16.8.708.2

Reason Heuristics
PUP.SalyutemPlyus.F
15.1.13.9

Sophos
PUA 'OutBrowse Revenyou'
5.09

Trend Micro House Call
Suspici.3E5BCE57
7.2.13

Vba32 AntiVirus
Downloader.OutBrowse
3.12.26.3

VIPRE Antivirus
Threat.4150696
36504

File size:
574.3 KB (588,040 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\iroot.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
12/15/2014 12:00:00 AM

Valid to:
12/15/2015 11:59:59 PM

Subject:
CN=Salyutem Plyus LLC, O=Salyutem Plyus LLC, L=Kharkiv, S=Arkansas, C=UA

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
6B6BB9E1A48F64F47503D8DCF6A5D0D3

File PE Metadata
Compilation timestamp:
12/5/2009 10:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:O2kePEwHLfq6AnvbHCtQDDZRj9gEoug4sBQZXyq33xSYIXQOqa:O24M/AvbHCtsxgIgkCqZv2

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9741

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file iroot.exe has been seen being distributed by the following URL.

Remove iroot.exe - Powered by Reason Core Security