iroot.exe

1432254448

staRT PlAyIng

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application iroot.exe by staRT PlAyIng has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.downward234.info.
Publisher:
staRT PlAyIng  (signed and verified)

Product:
1432254448

Version:
1.15522.80.0

MD5:
85f5b7deb50f843608a8e0b1883d8515

SHA-1:
3fc72ac4f0df7e29c483c5826956d341a276c255

SHA-256:
ca5c989cd5700bef3be434e1befb069941b2e51f3e1f123ad045caa8c726993a

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/21/2024 5:02:50 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse (M)
16.11.25.22

File size:
695.8 KB (712,496 bytes)

Product version:
1.15522.80.0

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\iroot.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
5/17/2015 8:00:00 PM

Valid to:
12/11/2015 8:59:59 PM

Subject:
CN=staRT PlAyIng, O=staRT PlAyIng, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
0768DE98A7700CEC69341965A40B088F

File PE Metadata
Compilation timestamp:
12/5/2009 7:52:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:9iOPfveGh9FSWsHnbFtaosL4w/BWmK2l8Idsk+Ec/9a0KkJUYZ:9iOPthiFuoApjKAZdsk+BVzKkX

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file iroot.exe has been seen being distributed by the following URL.

http://get.downward234.info/.../1432254452/1432254452?10507199546ZmVvMS8 ZzQtLyw3Jl89KzQoKysiZjwyLzMrOB1lOC0gZWlnZWdgZFw4ZUxub08mYmJmZTgtIHlpaz0p

Remove iroot.exe - Powered by Reason Core Security