mipony_setup.exe

Installer Application

Application Generic

The application mipony_setup.exe, “Installer Application Setup ” has been detected as a potentially unwanted program by 7 anti-malware scanners. The program is a setup application that uses the Inno Setup installer, however the file is not signed with an authenticode signature from a trusted source. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. While running, it connects to the Internet address 166.ip-164-132-99.eu on port 80 using the HTTP protocol.
Publisher:
Application Generic

Product:
Installer Application

Description:
Installer Application Setup

Version:
5.7.3.3

MD5:
bfc83d61d409015886056dc6e1f80d1d

SHA-1:
103567cb13ec63dc79be6238f2d24b55ff69f868

SHA-256:
e8956c91dee79fcba7aea7a4ebe56cdf9f5b051242f8e829d2fd185d1f556df2

Scanner detections:
7 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/25/2024 11:09:01 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15726

ESET NOD32
Win32/InstallCore.AAU potentially unwanted (variant)
9.11995

Fortinet FortiGate
Riskware/InstallCore
7/26/2015

McAfee
RDN/Generic.dx!d2w
5600.6693

Reason Heuristics
PUP.Win.Reputation
15.7.8.14

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
42318

File size:
808.9 KB (828,267 bytes)

Product version:
2.3.6

Copyright:
Internet Web Installer

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\mipony_setup.exe

File PE Metadata
Compilation timestamp:
6/19/1992 5:52:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:NKRFigdR5+UsC8L5p1SWHNoN4Rp2WoinKh8NT2:N4XNlhAtAeQWoaKCq

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Entropy:
7.8998

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file mipony_setup.exe has been seen being distributed by the following 3 URLs.

temp:Mipony_Setup.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 166.ip-164-132-99.eu  (164.132.99.166:80)

TCP (HTTP):
Connects to ec2-54-232-235-7.sa-east-1.compute.amazonaws.com  (54.232.235.7:80)

TCP (HTTP):
Connects to ec2-52-67-76-234.sa-east-1.compute.amazonaws.com  (52.67.76.234:80)

TCP (HTTP):
Connects to ec2-52-206-2-43.compute-1.amazonaws.com  (52.206.2.43:80)

TCP (HTTP):
Connects to ec2-54-186-199-44.us-west-2.compute.amazonaws.com  (54.186.199.44:80)

TCP (HTTP):
Connects to ec2-52-26-136-207.us-west-2.compute.amazonaws.com  (52.26.136.207:80)

TCP (HTTP):
Connects to ec2-34-198-66-66.compute-1.amazonaws.com  (34.198.66.66:80)

TCP (HTTP):
Connects to 50.115.122.45.static.westdc.net  (50.115.122.45:80)

TCP (HTTP):
Connects to ec2-52-2-72-151.compute-1.amazonaws.com  (52.2.72.151:80)

TCP (HTTP):
Connects to ec2-52-25-117-203.us-west-2.compute.amazonaws.com  (52.25.117.203:80)

TCP (HTTP):
Connects to ec2-52-214-247-42.eu-west-1.compute.amazonaws.com  (52.214.247.42:80)

TCP (HTTP):
Connects to ec2-52-208-40-227.eu-west-1.compute.amazonaws.com  (52.208.40.227:80)

TCP (HTTP):
Connects to a23-56-207-186.deploy.static.akamaitechnologies.com  (23.56.207.186:80)

TCP (HTTP):

Remove mipony_setup.exe - Powered by Reason Core Security