otobus-oyunu-downloader.exe

The application otobus-oyunu-downloader.exe has been detected as a potentially unwanted program by 15 anti-malware scanners. The program is a setup application that uses the Inno Setup installer, however the file is not signed with an authenticode signature from a trusted source. According to Microsoft Security Essentials, the software includes a bundle of the DealPly adware which is installed on a user's PC during setup using the InstallCore platform. The file has been seen being downloaded from www.indiroyunu.com.
MD5:
fd81181db3df3db4531468c8026517f4

SHA-1:
645c39aaa2e4553986a3d631ab8db5645df756d7

SHA-256:
51c0f5803437a201a4c12aacfdf78e9fa86ee9a584f67cc30b2c8f8ce5f0fb5c

Scanner detections:
15 / 68

Status:
Potentially unwanted

Explanation:
This software bundler installs other potentially unwanted software, including DealPly. Which includes offers in a user's web browser which state they are "Powered by DealPly".

Analysis date:
4/24/2024 12:55:34 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.111.96

avast!
Win32:Installer-I [PUP]
2014.9-160614

Bkav FE
W32.Clodb27.Trojan
1.3.0.4261

Comodo Security
ApplicUnwnt
17223

Dr.Web
Adware.InstallCore.101
9.0.1.0166

ESET NOD32
Win32/InstallCore.BY (variant)
10.9012

F-Prot
W32/InstallCore.R.gen
v6.4.7.1.166

Malwarebytes
v2016.06.14.08

McAfee
Artemis!FD81181DB3DF
5600.6368

Microsoft Security Essentials
1.163.1557.3

Reason Heuristics
PUP.InstallCore.ENG (M)
16.6.14.20

Trend Micro House Call
TROJ_GEN.R0CBH05J913
7.2.166

Trend Micro
TROJ_FAKEAV.BMC
10.465.14

VIPRE Antivirus
InstallCore
23092

File size:
705.1 KB (721,976 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Common path:
C:\users\{user}\downloads\otobus-oyunu-downloader.exe

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:0kOyMJfsy4ZooK98End54ktZZ1HRX7MkEaMss40YFFS6jYmjH1Dk:lOyMJfsTZoHJAkB1HBCsv0o46HVDk

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file otobus-oyunu-downloader.exe has been seen being distributed by the following URL.

Remove otobus-oyunu-downloader.exe - Powered by Reason Core Security