jumpflip.expext.exe

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application jumpflip.expext.exe by Jump Flip has been detected as adware by 18 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. While running, it connects to the Internet address install.jumpflip.net on port 80 using the HTTP protocol.
Publisher:
Jump Flip  (signed and verified)

Version:
1.0.6242.39491

MD5:
f5334fdb4f5ac02f043509d821877e66

SHA-1:
5b25bee6bf5d2783359d643faf59091a6d0390ae

SHA-256:
e4ab42c54fdfa9ad5817f37234209904b0cc4803e27fc4cb8580af6e8990669f

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 7:47:26 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.BJ
6375733

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.211.46

avast!
Win32:BrowseFox-DZ [PUP]
150129-1

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15218

Bitdefender
Adware.BrowseFox.BJ
1.0.20.245

Bkav FE
W32.HfsAdware
1.3.0.6379

Emsisoft Anti-Malware
Adware.BrowseFox.BJ
9.0.0.4799

ESET NOD32
Win32/BrowseFox.AA potentially unwanted application
7.0.302.0

F-Prot
W32/S-782d657c
v6.4.7.1.166

F-Secure
Adware.BrowseFox.BJ
5.13.68

G Data
Adware.BrowseFox.BJ
15.2.25

McAfee
Program.BrowseFox-FVA
16.8.708.2

MicroWorld eScan
Adware.BrowseFox.BJ
16.0.0.147

NANO AntiVirus
Riskware.Win32.BrowseFox.dlbjxp
0.30.0.126

nProtect
Adware.BrowseFox.BJ
15.02.17.01

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Adware.Yontoo.JumpFlip
15.2.18.17

VIPRE Antivirus
Threat.4741131
36694

File size:
99.3 KB (101,664 bytes)

Product version:
1.0.6242.39491

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\jump flip\bin\jumpflip.expext.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/21/2013 8:00:00 PM

Valid to:
8/22/2015 7:59:59 PM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
2/18/2015 11:30:16 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:j76msVSg0IARfI+8G2dBKCKXfPWk6EHIkmnMB+u4xlKgSwx:+VWIu4dKXf+k6cMxlKgSwx

Entry address:
0x563E

Entry point:
E8, AB, 3C, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 64, 7F, 41, 00, FF, 15, 4C, 20, 41, 00, 85, C0, 75, 18, 56, E8, 2F, 08, 00, 00, 8B, F0, FF, 15, 68, 20, 41, 00, 50, E8, DF, 07, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, C0, 91, 41, 00, 00, 74, 05, E9, CD, 3C, 00, 00, 57, 8B...
 
[+]

Entropy:
6.4322

Code size:
65.5 KB (67,072 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to install.jumpflip.net  (70.186.131.184:80)

Remove jumpflip.expext.exe - Powered by Reason Core Security