iroot.exe

Click tRUst oPt

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application iroot.exe by Click tRUst oPt has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.sad234.info.
Publisher:
Click tRUst oPt  (signed and verified)

Version:
3472.15523.1220.1287

MD5:
a72390bbbe69a79170c097f5766f1589

SHA-1:
cc6a93023b8ca98ca6728fdc31ccb3020afa2a81

SHA-256:
8814dd063a03bbddab3fa71d539b4410dcae83fe3f1c26cda73ef5f0d9624116

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/27/2024 1:42:49 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse (M)
16.7.21.12

File size:
759 KB (777,240 bytes)

Product version:
3472.15523.1220.1287

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\iroot.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
5/18/2015 8:00:00 AM

Valid to:
1/28/2016 7:59:59 AM

Subject:
CN=Click tRUst oPt, O=Click tRUst oPt, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
6DC74B0587B6101E855391A7D3BB50EF

File PE Metadata
Compilation timestamp:
12/6/2009 6:52:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:Ri3yFxfCTh+jps7VPUgXgNLYYb3swDY9udth5e2LBeRiCWjVD0m8lAwHbzfc8vyz:RiYxs7VZGYY4wDIQtm21eRFWl6xk8651

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9630

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file iroot.exe has been seen being distributed by the following URL.

Remove iroot.exe - Powered by Reason Core Security