oneclickroot.exe

KBM2 Installer

sterkly LLC

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application oneclickroot.exe by sterkly has been detected as adware by 6 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. The file has been seen being downloaded from www.techtastic.nl.
Publisher:
sterkly LLC  (signed and verified)

Product:
KBM2 Installer

Version:
2.1.0.5

MD5:
a9e6b31117acf95a2ed60cc99b9ad71d

SHA-1:
282564aa5c27ce8a5d7db218848637c9d2cd2bfa

SHA-256:
1b8254f211db28e186900a7c5af05f55b5175743c46a6d635dbe90f51ad57c2c

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
4/19/2024 12:42:50 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
AdInject.Sterkly
2015.0.3599

Bkav FE
W32.Clod118.Trojan
1.3.0.4613

ESET NOD32
Win32/KBM (variant)
8.9265

McAfee
Artemis!A9E6B31117AC
5600.7255

Reason Heuristics
PUP.Installer.sterkly.M
14.2.21.9

VIPRE Antivirus
sterkly LLC
25226

File size:
519.1 KB (531,576 bytes)

Product version:
2.1.0.5

Copyright:
(c) Sterkly LLC. All rights reserved.

Original file name:
KBM2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\oneclickroot.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/22/2013 1:00:00 AM

Valid to:
2/22/2015 12:59:59 AM

Subject:
CN=sterkly LLC, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=sterkly LLC, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
113C6B2C72DEF110BE64B2ABBC52861E

File PE Metadata
Compilation timestamp:
1/7/2013 10:45:58 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:APSh8RbmElZtwKZn7dkoXYJhW32oiJ6kZ/oWQpTr:APSMms7koXR32oSLZAWQpH

Entry address:
0x397CB

Entry point:
E8, A3, 6C, 00, 00, E9, 89, FE, FF, FF, 3B, 0D, D0, FB, 46, 00, 75, 02, F3, C3, E9, 2A, 6D, 00, 00, 8B, FF, 55, 8B, EC, 56, 8B, 75, 14, 85, F6, 75, 04, 33, C0, EB, 61, 83, 7D, 08, 00, 75, 13, E8, 6E, 33, 00, 00, 6A, 16, 5E, 89, 30, E8, 01, 73, 00, 00, 8B, C6, EB, 48, 83, 7D, 10, 00, 74, 16, 39, 75, 0C, 72, 11, 56, FF, 75, 10, FF, 75, 08, E8, FB, 6D, 00, 00, 83, C4, 0C, EB, C7, FF, 75, 0C, 6A, 00, FF, 75, 08, E8, 49, 2F, 00, 00, 83, C4, 0C, 83, 7D, 10, 00, 74, BB, 39, 75, 0C, 73, 0E, E8, 24, 33, 00, 00, 6A...
 
[+]

Code size:
339 KB (347,136 bytes)

The file oneclickroot.exe has been seen being distributed by the following URL.

Remove oneclickroot.exe - Powered by Reason Core Security