mediaplayer__12186_i1529390057_il110.exe

LLC BK UKRBUDMONTAZH

The application mediaplayer__12186_i1529390057_il110.exe by LLC BK UKRBUDMONTAZH has been detected as adware by 10 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address server-54-230-52-163.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
LLC BK UKRBUDMONTAZH  (signed and verified)

Version:
1.1.5.89

MD5:
deb1fbe1d43416839623378cc303abd4

SHA-1:
bfb4c1c8c265d41313671e2480bec960dfc9e214

SHA-256:
d126dddfa9c8e69ce70bd2de72ac64168f1066b504711e5bca074a1f81821740

Scanner detections:
10 / 68

Status:
Adware

Analysis date:
5/8/2024 12:27:05 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Amonetize-JK [PUP]
150602-1

AVG
Generic
2016.0.3089

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Amonetize.2350
9.0.1.05190

ESET NOD32
Win32/Amonetize.EX potentially unwanted application
7.0.302.0

K7 AntiVirus
Unwanted-Program
13.204.16128

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.1937

Malwarebytes
PUP.Optional.Amonetize
v2015.06.03.04

Reason Heuristics
PUP.Amonitize.Installer
15.6.3.16

VIPRE Antivirus
Threat.4785227
40786

File size:
767.5 KB (785,936 bytes)

Product version:
1.1.5.89

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\mediaplayer__12186_i1529390057_il110.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/2/2015 5:30:00 AM

Valid to:
3/2/2016 5:29:59 AM

Subject:
CN=LLC BK UKRBUDMONTAZH, O=LLC BK UKRBUDMONTAZH, STREET="street Kartvelishvili, 7/2", L=Kiev, S=Kiev, PostalCode=03148, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
34E84A9E0132F026B71D20920D491DAC

File PE Metadata
Compilation timestamp:
6/2/2015 12:46:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:+oghKZgiENTdCGY+s86ySAgba+bo7uaaKV7Ni7aMM50JNmu1facYFxhfM:3Lyi4TAt+AygNbeuaNVZ6a15wpYFvfM

Entry address:
0xE607

Entry point:
E8, 52, 3E, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, A1, 08, 4C, 36, 00, 85, C0, 75, 1D, E8, E8, 1E, 00, 00, 6A, 1E, E8, 3E, 1F, 00, 00, 68, FF, 00, 00, 00, E8, 37, 24, 00, 00, A1, 08, 4C, 36, 00, 59, 59, 8B, 4D, 08, 85, C9, 75, 01, 41, 51, 6A, 00, 50, FF, 15, 6C, 60, 35, 00, 5D, C3, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 08, 4C, 36, 00, 85, C0, 75, 1D, E8, A0, 1E, 00, 00, 6A, 1E, E8, F6, 1E, 00, 00, 68, FF, 00, 00, 00, E8, EF, 23, 00, 00, A1, 08, 4C, 36, 00, 59, 59, 85, F6, 74, 04, 8B...
 
[+]

Entropy:
7.6962

Code size:
147.5 KB (151,040 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-53-84.jfk6.r.cloudfront.net  (54.230.53.84:80)

TCP (HTTP):
Connects to server-54-230-52-163.jfk6.r.cloudfront.net  (54.230.52.163:80)

TCP (HTTP):
Connects to ec2-54-235-95-208.compute-1.amazonaws.com  (54.235.95.208:80)

Remove mediaplayer__12186_i1529390057_il110.exe - Powered by Reason Core Security