java_installer.exe

Guangzhou Shibei Information Technology Co., Ltd.

The application java_installer.exe by Guangzhou Shibei Information Technology Co. has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the Amonetize Downloader installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:

MD5:
640f1d1f7247d2b409adb1529baef44d

SHA-1:
89506843a30c5090b111e3b2cca4e1b5363d4cf7

SHA-256:
024a93fd9aa35fbced682ce7ab3ca98cceafa0117f4a9678382e00f77d439ccf

Scanner detections:
29 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/6/2024 3:59:26 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.E
867

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.07.31

Avira AntiVirus
APPL/SquareNet.AO
7.11.164.150

avast!
Win32:Malware-gen
2014.9-140921

AVG
BundleApp_r.N
2015.0.3345

Bitdefender
Application.Bundler.E
1.0.20.1320

Clam AntiVirus
Win.Trojan.Bundler
0.98/19246

Comodo Security
Application.Win32.SquareNet.B
19574

Dr.Web
Adware.Downware.4148
9.0.1.0264

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler
14.09.21

ESET NOD32
Win32/SquareNet.A potentially unwanted application
8.7.0.302.0

F-Prot
W32/A-c7715e1d
v6.4.7.1.166

F-Secure
Application.Bundler.E
11.2014-21-09_1

G Data
Application.Bundler
14.9.24

herdProtect (fuzzy)
2014.12.3.12

IKARUS anti.virus
PUA.Bundler
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.181.12898

Malwarebytes
PUP.Optional.MultiPlug.A
v2014.09.21.01

McAfee
PUP-FAU
5600.7001

Microsoft Security Essentials
Threat.Undefined
1.185.642.0

MicroWorld eScan
Application.Bundler.E
15.0.0.1011

Panda Antivirus
Trj/Genetic.gen
14.09.21.01

Qihoo 360 Security
Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.GuangzhouShibeiInformationTechnologyCo.O
14.9.21.1

Sophos
Square Network Installer
4.98

SUPERAntiSpyware
Heur.Agent/Gen-FakeChrome
10347

VIPRE Antivirus
Threat.4150696
31208

Zillya! Antivirus
Backdoor.Klon.Win32.1055
2.0.0.1928

File size:
924.3 KB (946,472 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Amonetize Downloader

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/14/2014 7:00:00 PM

Valid to:
5/15/2015 6:59:59 PM

Subject:
CN="Guangzhou Shibei Information Technology Co., Ltd.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Guangzhou Shibei Information Technology Co., Ltd.", L=Guangzhou, S=Guangdong, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
730FCD851F607FC42ED72447D10ED84A

File PE Metadata
Compilation timestamp:
6/20/2014 2:44:45 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:llj2GlONoWagpg7uHn29g0qSXYhy2H9W5BAP52BlmF:CUgqYhBW5GWlmF

Entry address:
0x8319F

Entry point:
E8, 52, CB, 00, 00, E9, 79, FE, FF, FF, 8B, FF, 55, 8B, EC, 51, 83, 65, FC, 00, 53, 8B, 5D, 10, 85, DB, 75, 07, 33, C0, E9, 9A, 00, 00, 00, 57, 83, FB, 04, 72, 75, 8D, 7B, FC, 85, FF, 76, 6E, 8B, 4D, 0C, 8B, 45, 08, 8A, 10, 83, C0, 04, 83, C1, 04, 84, D2, 74, 52, 3A, 51, FC, 75, 4D, 8A, 50, FD, 84, D2, 74, 3C, 3A, 51, FD, 75, 37, 8A, 50, FE, 84, D2, 74, 26, 3A, 51, FE, 75, 21, 8A, 50, FF, 84, D2, 74, 10, 3A, 51, FF, 75, 0B, 83, 45, FC, 04, 39, 7D, FC, 72, C2, EB, 3F, 0F, B6, 40, FF, 0F, B6, 49, FF, EB, 46...
 
[+]

Entropy:
6.6944

Code size:
633.5 KB (648,704 bytes)

The file java_installer.exe has been seen being distributed by the following 3 URLs.

Remove java_installer.exe - Powered by Reason Core Security