pip2671_myc_.exe

Offercast - APN Install Manager

Ask.com

This installer is part of the Ask.com (APN) network which will install the Ask.com branded toolbar or browser extension which will take control of the web browser's search functions. The application pip2671_myc_.exe by Ask.com has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Offercast APN Install Manager installer. It is also typically executed from the user's temporary directory.
Publisher:
Ask.com  (signed and verified)

Product:
Offercast - APN Install Manager

Version:
2.6.7.1

MD5:
86b1251c0550fc52f79fca65d820f311

SHA-1:
70faaa92659d5299cf9f6b443c2b1c80f9b63141

SHA-256:
4ccf4eaed54fb1849f1f10cb8367d5b61c98059df2a23a04aca6d0b6c6a8cbe1

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
This is the APN Offercast install manager which will offer the user to opt-out of installing the Ask.com Toolbar as part of the setup routine.

Analysis date:
4/25/2024 6:30:59 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Ask.Installer (M)
16.2.3.15

File size:
773.2 KB (791,752 bytes)

Product version:
2.6.7.1

Copyright:
2010 (c) Ask.com. All rights reserved.

Original file name:
AskInstaller.exe

File type:
Executable application (Win32 EXE)

Installer:
Offercast APN Install Manager

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\pip2671_myc_.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/20/2011 7:00:00 AM

Valid to:
6/19/2014 6:59:59 AM

Subject:
CN=Ask.com, OU=Distribution, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Ask.com, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0965F2AC7236C7E1BDCA44ED139B273A

File PE Metadata
Compilation timestamp:
9/14/2012 1:23:18 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:LNs2dWfYFlFDOifTKlOW1ckKg1YoPTJDg2T:BK6DJlW1ckKg1T62T

Entry address:
0x683E4

Entry point:
E8, 1F, DE, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 18, 94, 48, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 44, 83, 48, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, A8, 6C, 4A, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, AC...
 
[+]

Entropy:
6.4686

Code size:
537.5 KB (550,400 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a104-68-198-23.deploy.static.akamaitechnologies.com  (104.68.198.23:80)

TCP (HTTP):
Connects to a184-87-216-68.deploy.static.akamaitechnologies.com  (184.87.216.68:80)

Remove pip2671_myc_.exe - Powered by Reason Core Security