jumpflip.browseradapter64.exe

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application jumpflip.browseradapter64.exe by Jump Flip has been detected as adware by 13 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. While running, it connects to the Internet address install.jumpflip.net on port 80 using the HTTP protocol.
Publisher:
Jump Flip  (signed and verified)

MD5:
eae478042d219364ca03d46aae8c501a

SHA-1:
077be9b931e17e779baf23c84b42cd96d8a7fa54

SHA-256:
2ecec7ef9576b512a840ecc78a4b343ec7c4e7f904776fd6750f8b2b2e3dec67

Scanner detections:
13 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 6:24:57 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.AD
877

avast!
Win32:BrowseFox-F [PUP]
2014.9-140910

AVG
Webet
2015.0.3355

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1499

Bitdefender
Adware.SwiftBrowse.AD
1.0.20.1265

Emsisoft Anti-Malware
Adware.SwiftBrowse.AD
8.14.09.10.11

F-Secure
Adware.SwiftBrowse.AD
11.2014-10-09_4

G Data
Adware.SwiftBrowse.AD
14.9.24

MicroWorld eScan
Adware.SwiftBrowse.AD
15.0.0.759

nProtect
Adware.SwiftBrowse.AD
14.09.07.01

Reason Heuristics
PUP.JumpFlip.Y
14.9.9.15

Sophos
Browse Fox
4.98

VIPRE Antivirus
Threat.4741131
32938

File size:
112.3 KB (114,976 bytes)

File type:
Executable application (Win64 EXE)

Common path:
C:\Program Files\jump flip\bin\jumpflip.browseradapter64.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/22/2013 2:00:00 AM

Valid to:
8/23/2015 1:59:59 AM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
9/9/2014 3:56:04 PM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:4oD21WCT9/Z8iZrUxgUwA7yXrK2tanInq:pD6NT8iZrafwAukv

Entry address:
0x3D1C

Entry point:
48, 83, EC, 28, E8, C3, 26, 00, 00, 48, 83, C4, 28, E9, 52, FE, FF, FF, CC, CC, E9, EB, 05, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 66, 66, 0F, 1F, 84, 00, 00, 00, 00, 00, 48, 3B, 0D, 39, 53, 01, 00, 75, 11, 48, C1, C1, 10, 66, F7, C1, FF, FF, 75, 02, F3, C3, 48, C1, C9, 10, E9, 2D, 27, 00, 00, CC, 40, 53, 48, 83, EC, 40, 48, 8B, D9, EB, 0F, 48, 8B, CB, E8, 6D, 28, 00, 00, 85, C0, 74, 13, 48, 8B, CB, E8, 95, 07, 00, 00, 48, 85, C0, 74, E7, 48, 83, C4, 40, 5B, C3, 8B, 05...
 
[+]

Entropy:
6.2079

Code size:
70.5 KB (72,192 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to install.jumpflip.net  (70.186.131.184:80)

Remove jumpflip.browseradapter64.exe - Powered by Reason Core Security