maintainer.bak

Mokiray

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file maintainer.bak by Mokiray has been detected as adware by 22 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Mokiray  (signed and verified)

Version:
1.0.5431.26359

MD5:
f76ce75a01d1c150c2f6587c332cd60e

SHA-1:
150675cc20b796d09de1dfacb7730f625e81bbe9

SHA-256:
4f546284bf909250423ab89292f00340bacd7fe25fce99002a378dca472b2972

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/18/2024 6:46:08 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.1
805

AhnLab V3 Security
Adware/Win32.SwiftBrowse
2014.11.15

Avira AntiVirus
ADWARE/BrowseFox.Gen7
7.11.185.228

avast!
Win32:Adware-BYZ [PUP]
2014.9-141121

AVG
Generic
2015.0.3283

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141121

Bitdefender
Gen:Variant.Adware.SwiftBrowse.1
1.0.20.1625

Clam AntiVirus
Win.Adware.Agent-22685
0.98/21411

Dr.Web
Trojan.BPlug.281
9.0.1.0325

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
8.14.11.21.09

ESET NOD32
Win32/BrowseFox
8.10726

F-Prot
W32/Yotoon.A.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.SwiftBrowse.1
11.2014-21-11_6

G Data
Gen:Variant.Adware.SwiftBrowse
14.11.24

K7 AntiVirus
Trojan
13.185.14021

Kaspersky
not-a-virus:AdWare.Win32.Yotoon
14.0.0.2910

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.1
15.0.0.975

NANO AntiVirus
Riskware.Win32.Kranet.dgiwfc
0.28.6.63362

Qihoo 360 Security
Win32/Virus.Adware.708
1.0.0.1015

Reason Heuristics
PUP.Mokiray.N
14.11.29.17

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

Zillya! Antivirus
Adware.Kranet.Win32.476
2.0.0.1982

File size:
120.8 KB (123,672 bytes)

Product version:
1.0.5431.26359

Language:
English (United States)

Common path:
C:\ProgramData\06154ba7-7ceb-4959-a6bd-bf38bdec8cc6\maintainer.bak

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/21/2014 5:00:00 PM

Valid to:
1/22/2015 4:59:59 PM

Subject:
CN=Mokiray, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Mokiray, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6190556C04EEBA4051F111670BD7D546

File PE Metadata
Compilation timestamp:
11/14/2014 3:38:45 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
1536:v3eRgxyOpGX5sfnC6P2dV59IikYYf9J892bbY+mhbcQ/Wm1sWjcdzPQI0ypxCO8d:/K35/9oxfTk+qvn6zPQI0ypxCO0XbZvD

Entry address:
0x8A72

Entry point:
E8, 95, 57, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 68, B2, 41, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 79, 45, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 7A, F3, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.1805

Code size:
68.5 KB (70,144 bytes)

Remove maintainer.bak - Powered by Reason Core Security