MinecraftAccount__7934_il3972.exe

January Frost

Alfa Tekhniks, TOV

The application MinecraftAccount__7934_il3972.exe by Alfa Tekhniks, TOV has been detected as a potentially unwanted program by 4 anti-malware scanners. This is a setup program which is used to install the application. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from 437659.superfastdownload000.site.
Publisher:
January Inc  (signed by Alfa Tekhniks, TOV)

Product:
January Frost

Version:
2.0.1.0

MD5:
838f546eab707b3c35690b6848829f37

SHA-1:
385a2bcb5c12f7271cd8550c8f5dd1e03b64e1da

SHA-256:
d450d04f95f795e86810d555ee3ff059748c25b35648163a781a894e86d3042a

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
6/1/2020 6:52:27 PM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.16048
9.0.1.05190

Microsoft Security Essentials
Threat.Undefined
1.225.2251.0

Reason Heuristics
PUP.Amonetize.AlfaTekh (M)
16.7.25.22

VIPRE Antivirus
Threat.4150696
50706

File size:
768.7 KB (787,144 bytes)

Product version:
2.0.1.0

Original file name:
jf.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\minecraftaccount__7934_il3972.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/29/2016 12:00:00 AM

Valid to:
6/29/2017 11:59:59 PM

Subject:
CN="Alfa Tekhniks, TOV", OU=IT, O="Alfa Tekhniks, TOV", STREET="vul. Saksahanskoho, 67", L=Kyyiv, S=Kyyiv, PostalCode=01033, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
486FB578493CF1EEF1A7A9A842B957D4

File PE Metadata
Compilation timestamp:
7/20/2016 1:08:19 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:khVjdwG8JbtONCiF9/lvnhPzIJ7zHnla9X/tu8mTb:23wZ5g55vnh7It01sRP

Entry address:
0xECEF

Entry point:
E8, A7, 37, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 94, 3B, 43, 00, FF, 15, B0, 70, 42, 00, 85, C0, 75, 18, 56, E8, F6, 17, 00, 00, 8B, F0, FF, 15, 54, 70, 42, 00, 50, E8, 41, 18, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 80, F9, 40, 73, 15, 80, F9, 20, 73, 06, 0F, AD, D0, D3, EA, C3, 8B, C2, 33, D2, 80, E1, 1F, D3, E8, C3, 33, C0, 33, D2, C3, 55, 8B, EC, 53, 8B, 5D, 10, 57, 33, FF, 85, DB, 75, 14, E8, A1...
 
[+]

Code size:
150.5 KB (154,112 bytes)

The file MinecraftAccount__7934_il3972.exe has been seen being distributed by the following URL.

Remove MinecraftAccount__7934_il3972.exe - Powered by Reason Core Security