megabrowsebho.dll

Mokiray

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module megabrowsebho.dll by Mokiray has been detected as adware by 21 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Mega Browse  (signed by Mokiray)

Product:
Mega Browse

Version:
1.0.0.6

MD5:
79547e045efc04194c8d3151ab495fcf

SHA-1:
45c51dbeec0938730a3b7840fa88cc91bdd4427f

SHA-256:
72fb55b3cdd38c12674faa859ad7443a0734cda79cc2df253dcec00763c6e107

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/19/2024 12:31:56 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Adware/Win32.BrowseFox
2015.01.06

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.199.188

avast!
Win32:BrowseFox-EH [PUP]
2014.9-150201

AVG
BrowseFox.F
2016.0.3212

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1521

Comodo Security
Application.Win32.BrowseFox.JM
20617

ESET NOD32
Win32/BrowseFox (variant)
9.10971

Fortinet FortiGate
Riskware/Agent
2/1/2015

F-Prot
W32/S-7bed2e86
v6.4.7.1.166

K7 AntiVirus
Trojan
13.1814554

Kaspersky
not-a-virus:WebToolbar.Win32.Agent
14.0.0.2554

Malwarebytes
PUP.Optional.MegaBrowse.A
v2015.02.01.04

McAfee
BrowseFox
5600.6868

NANO AntiVirus
Trojan.Win32.BPlug.dfogbn
0.30.0.64448

Panda Antivirus
Trj/CI.A
15.02.01.04

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo
15.2.1.4

Sophos
Generic PUA EF
4.98

Trend Micro House Call
Suspicious_GEN.F47V0105
7.2.32

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

Zillya! Antivirus
Adware.Agent.Win32.29653
2.0.0.2027

File size:
244.8 KB (250,648 bytes)

Product version:
1.0.0.6

Copyright:
(c) Mega Browse. All rights reserved.

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\mega browse\megabrowsebho.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/5/2015 4:00:00 AM

Valid to:
3/6/2016 3:59:59 AM

Subject:
CN=Mokiray, O=Mokiray, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
13396D8733DD5F35D3FC41477C1EB99D

File PE Metadata
Compilation timestamp:
1/30/2015 6:34:56 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:9yq7v6kKELk3SVaUs0FHxB+Vpl63gY+NEm+ZKTIRj49ocEWyu:9yq7vv4SVcYHdto+Z5SXLt

Entry address:
0xF515

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EA, 7E, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, C8, 21, 03, 10, E8, 4C, 02, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 4C, 77, 03, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, C4, 93, 02, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
6.0730

Developed / compiled with:
Microsoft Visual C++

Code size:
159 KB (162,816 bytes)

Remove megabrowsebho.dll - Powered by Reason Core Security