JD_Extractor_6397.exe

The application JD_Extractor_6397.exe has been detected as a potentially unwanted program by 20 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The installer uses the InstallMonetizer platform which will donwload and install adware toolbars and other potentially unwanted software offers during setup. The file has been seen being downloaded from cdn.shyapotato.us.
MD5:
43c78a9f992c864ec10b4a5aae4a5bc2

SHA-1:
12416297151c6860b66ee7aec3e73b47d9b9ccf8

SHA-256:
ffa9551ca7aed9187bf4d89849466f13e190face62c5d7e7e8043df086c343ef

Scanner detections:
20 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallMonetizer distribution platform to bundle adware.

Analysis date:
4/19/2024 9:06:48 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
NSIS:Adware-JM [PUP]
2014.9-131220

AVG
MultiBundle.D
2014.0.3543

Bitdefender
DeepScan:Generic.Mitglied
1.0.20.1205

Dr.Web
Trojan.DownLoader7.58240
9.0.1.0241

Emsisoft Anti-Malware
DeepScan:Generic.Mitglied
8.13.08.29.01

Fortinet FortiGate
W32/AutoRun.NAD
8/29/2013

F-Prot
W32/AdAgent.AI.gen
v6.4.7.1.166

F-Secure
DeepScan:Generic.Mitglied
11.2013-29-08_5

G Data
DeepScan:Generic.Mitglied
13.8.22

K7 AntiVirus
Adware
13.166.8577

Malwarebytes
PUP.Adware.Agent
v2013.08.29.01

McAfee
Artemis!1F4F603867B2
5600.7275

MicroWorld eScan
DeepScan:Generic.Mitglied
14.0.0.723

Norman
Suspicious_Gen3.AILEZ
11.20131220

nProtect
Trojan/W32.Agent.1440921
13.04.25.03

Panda Antivirus
Suspicious file
13.12.20.04

SUPERAntiSpyware
Heur.Agent/Gen-WhiteBox
10707

Trend Micro House Call
TROJ_GEN
7.2.241

Trend Micro
TROJ_GEN
10.465.29

VIPRE Antivirus
InstallMonetizer
19732

File size:
1.4 MB (1,440,921 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\jd_extractor_6397.exe

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:NnCHus872umRguuUmCr9uejsx6+G+8HXbJd5A8z3rGdKN2mwx8w8OSv:ZCTYrmRguSC1jsMX+ybSVEM8w8OSv

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9780

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file JD_Extractor_6397.exe has been seen being distributed by the following URL.

Remove JD_Extractor_6397.exe - Powered by Reason Core Security