mnr.17.03.2014.translated.darwasha.exe

Install Lab ltd.

The application mnr.17.03.2014.translated.darwasha.exe by Install Lab ltd has been detected as adware by 8 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from www.firedrive-downloader.com and multiple other hosts.
Publisher:
Install Lab ltd.  (signed and verified)

MD5:
2452e583b7e99a2be2ea0f6cb317e6c3

SHA-1:
254325924c42b4c350744d9e8fdd339678dc807b

SHA-256:
a56fb9c4c81baee410f4f57554b1cd344a189a3403b035ba83526816dd7da524

Scanner detections:
8 / 68

Status:
Adware

Explanation:
The installer bundles additional adware-type offers (ad-supported) that are displayed to the user during setup and typically installed by default. These include web browser ad-injectors.

Analysis date:
4/16/2024 12:29:34 PM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Yontoo.11
9.0.1.0143

G Data
NSIS.Adware.OneClickDownloader
14.5.24

Malwarebytes
PUP.Optional.OneClickDownloader.A
v2014.05.23.12

Microsoft Security Essentials
TrojanDownloader:Win32/Clikug.B
1.10401

Qihoo 360 Security
Win32/Virus.Adware.47b
1.0.0.1015

Reason Heuristics
PUP.InstallLabltd.DD
14.8.7.23

Trend Micro House Call
TROJ_GEN.F47V0317
7.2.143

VIPRE Antivirus
Conduit
27888

File size:
423.7 KB (433,832 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\mnr.17.03.2014.translated.darwasha.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
10/13/2013 2:00:00 AM

Valid to:
10/14/2014 1:59:59 AM

Subject:
CN=Install Lab ltd., O=Install Lab ltd., L=Tel Aviv, S=Tel Aviv, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
408CEA01026979279F7844366EFF6D80

File PE Metadata
Compilation timestamp:
12/6/2009 12:50:46 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:+Kpzhj4vTUgVz4BwcajamL7J0t5mh20k4RJUo3UU:rpzZ4gaz4KcQxJ0t5mjkWl31

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9003

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file mnr.17.03.2014.translated.darwasha.exe has been seen being distributed by the following 5 URLs.

http://www.firedrive-downloader.com/.../SA?Â?odkie_kA?Â?amstewka_-_Pretty_Little_Liars_S01E02_Lektor_PL_WEB-DL_XviD_-_KruchY.exe

http://www.firedrive-downloader.com/.../OVGPF.exe

Remove mnr.17.03.2014.translated.darwasha.exe - Powered by Reason Core Security