jumpflip.browseradapter.exe

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application jumpflip.browseradapter.exe by Jump Flip has been detected as adware by 4 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. While running, it connects to the Internet address install.jumpflip.net on port 80 using the HTTP protocol.
Publisher:
Jump Flip  (signed and verified)

MD5:
2e05befd9f7505e59b2f5c228c6a36c6

SHA-1:
6a0e69f925a3a1969aedbacc19ed88b9150005b5

SHA-256:
018379af5e4ddaa752b10b5eca14691fc0afa619f0b6e72f8f3d1726c6bb3cca

Scanner detections:
4 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/30/2024 10:31:30 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14426

Dr.Web
Trojan.BPlug.46
9.0.1.0116

ESET NOD32
Win32/BrowseFox (variant)
8.9704

Reason Heuristics
PUP.JumpFlip.W
14.8.8.0

File size:
93.3 KB (95,520 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\jump flip\bin\jumpflip.browseradapter.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/22/2013 2:00:00 AM

Valid to:
8/23/2015 1:59:59 AM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
4/22/2014 3:18:50 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:yaCokpz26EXNwnDtx1B2T27KfAIkp+nkBgXNTu7+:ya2526+NwXn2ohB3gXNTu7+

Entry address:
0x3005

Entry point:
E8, 85, 20, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, 70, 40, 41, 00, 75, 02, F3, C3, E9, 0C, 21, 00, 00, 8B, FF, 55, 8B, EC, 5D, E9, 07, 22, 00, 00, 8B, FF, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 3E, 22, 00, 00, 59, 85, C0, 74, 0F, FF, 75, 08, E8, C5, 07, 00, 00, 59, 85, C0, 74, E6, C9, C3, F6, 05, 78, 53, 41, 00, 01, BF, 6C, 53, 41, 00, BE, 10, 02, 41, 00, 75, 2C, 83, 0D, 78, 53, 41, 00, 01, 6A, 01, 8D, 45, FC, 50, 8B, CF, C7, 45, FC, 18, 02, 41, 00, E8, 2C, 00, 00, 00, 68, 6E, FB, 40, 00, 89, 35, 6C...
 
[+]

Code size:
59 KB (60,416 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to install.jumpflip.net  (70.186.131.184:80)

Remove jumpflip.browseradapter.exe - Powered by Reason Core Security