mobogenieP2sp.exe

mobogenie

Beijing AmazGame Age Internet Technology Co., Ltd.

The application mobogenieP2sp.exe by Beijing AmazGame Age Internet Technology Co. has been detected as a potentially unwanted program by 2 anti-malware scanners. While running, it connects to the Internet address cache.google.com on port 443.
Publisher:
mobogenie.com  (signed by Beijing AmazGame Age Internet Technology Co., Ltd.)

Product:
mobogenie

Description:
downloader

Version:
1.0.0.4

MD5:
f31ec4bbfc23a9fcb96697d888da9367

SHA-1:
3f0d578f6aad5e5ab1fa3044d0bf891ca08f7aee

SHA-256:
5282dade65cff999c522bde28ad02cada3a8f8c7ebc93e01e871ad094901fe05

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 12:37:47 AM UTC  (today)

Scan engine
Detection
Engine version

Bkav FE
W32.HfsAdware
1.3.0.6379

Reason Heuristics
PUP.Optional.BeijingAmazGameAgeInternetTechnologyCo
15.5.31.5

File size:
507.7 KB (519,872 bytes)

Product version:
1.0.0.4

Copyright:
Copyright (C) 2014 Gamease Age Digital Technology Co., Ltd., All rights

Original file name:
mobogenieP2sp.exe

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\Program Files\mobogenie3\mobogeniep2sp.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/16/2012 3:00:00 AM

Valid to:
6/16/2015 2:59:59 AM

Subject:
CN="Beijing AmazGame Age Internet Technology Co., Ltd.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Beijing AmazGame Age Internet Technology Co., Ltd.", L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
22CF7DA7B76FC5C4E77225CFA1BDA497

File PE Metadata
Compilation timestamp:
5/28/2015 5:08:46 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
10.0

CTPH (ssdeep):
12288:3N4wOVWpEKdSQRBP4kW/rAMBSwpMgr4I0f8o:3NZKKdPBPbgBSwplz0X

Entry address:
0x55D3C

Entry point:
E8, 22, 04, 00, 00, E9, B3, FD, FF, FF, FF, 25, C0, 02, 46, 00, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 18, 40, 47, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 40, 63, 47, 00, 89, 0D, 3C, 63, 47, 00, 89, 15, 38, 63, 47, 00, 89, 1D, 34, 63, 47, 00, 89, 35, 30, 63, 47, 00, 89...
 
[+]

Entropy:
6.4148

Code size:
377 KB (386,048 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to cache.google.com  (81.17.82.16:443)

TCP (HTTP SSL):
Connects to static.khi77.pie.net.pk  (221.120.207.16:443)

TCP (HTTP):
Connects to server-54-192-217-170.mrs50.r.cloudfront.net  (54.192.217.170:80)

TCP (HTTP):
Connects to server-54-192-217-135.mrs50.r.cloudfront.net  (54.192.217.135:80)

TCP (HTTP):
Connects to server-54-192-217-207.mrs50.r.cloudfront.net  (54.192.217.207:80)

TCP (HTTP):
Connects to server-54-192-217-163.mrs50.r.cloudfront.net  (54.192.217.163:80)

TCP (HTTP):
Connects to server-54-192-217-110.mrs50.r.cloudfront.net  (54.192.217.110:80)

TCP (HTTP):
Connects to server-54-192-217-90.mrs50.r.cloudfront.net  (54.192.217.90:80)

TCP (HTTP):
Connects to server-54-192-217-63.mrs50.r.cloudfront.net  (54.192.217.63:80)

TCP (HTTP):
Connects to server-54-192-217-55.mrs50.r.cloudfront.net  (54.192.217.55:80)

TCP (HTTP):
Connects to server-52-85-221-42.cdg50.r.cloudfront.net  (52.85.221.42:80)

TCP (HTTP):
Connects to server-52-85-221-253.cdg50.r.cloudfront.net  (52.85.221.253:80)

TCP (HTTP SSL):
Connects to tw194-static13.tw1.com  (110.93.194.13:443)

TCP (HTTP):
Connects to server-54-230-95-89.fra2.r.cloudfront.net  (54.230.95.89:80)

TCP (HTTP):
Connects to server-54-230-95-156.fra2.r.cloudfront.net  (54.230.95.156:80)

TCP (HTTP):
Connects to server-54-230-95-148.fra2.r.cloudfront.net  (54.230.95.148:80)

TCP (HTTP):
Connects to server-54-230-95-146.fra2.r.cloudfront.net  (54.230.95.146:80)

TCP (HTTP):
Connects to server-54-230-0-99.lhr5.r.cloudfront.net  (54.230.0.99:80)

TCP (HTTP):
Connects to server-54-230-0-88.lhr5.r.cloudfront.net  (54.230.0.88:80)

TCP (HTTP):
Connects to server-54-230-0-234.lhr5.r.cloudfront.net  (54.230.0.234:80)

Remove mobogenieP2sp.exe - Powered by Reason Core Security