po.exe

Supersoft

The application po.exe by Supersoft has been detected as adware by 29 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from s1.directxex.com.
Publisher:
Supersoft  (signed and verified)

MD5:
9ecc4740ace9c66388f660df7c998093

SHA-1:
f4c2dc90983b319562a40f6e43331547fdfc8357

SHA-256:
b683e5ea330dc6b6e887e706a9005f2e2c6543079aa786262c3c41c611f34983

Scanner detections:
29 / 68

Status:
Adware

Analysis date:
4/24/2024 6:57:06 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.1765676
786

Agnitum Outpost
Trojan.Crypt
7.1.1

Avira AntiVirus
TR/Dropper.MSIL.61810
7.11.188.92

avast!
MSIL:GenMalicious-ED [Trj]
2014.9-141210

AVG
MSIL4
2015.0.3264

Baidu Antivirus
Trojan.MSIL.Crypt
4.0.3.141210

Bitdefender
Trojan.GenericKD.1765676
1.0.20.1720

Comodo Security
UnclassifiedMalware
20174

Emsisoft Anti-Malware
Trojan.GenericKD.1765676
8.14.12.10.02

ESET NOD32
MSIL/Injector.EFB (variant)
8.10769

Fortinet FortiGate
MSIL/Injector.EBG!tr
12/10/2014

F-Secure
Trojan.GenericKD.1765676
11.2014-10-12_4

G Data
Trojan.GenericKD.1765676
14.12.24

IKARUS anti.virus
Trojan.MSIL.Crypt
t3scan.1.8.3.0

K7 AntiVirus
Trojan
13.185.14098

Kaspersky
Trojan.MSIL.Crypt
14.0.0.2817

Malwarebytes
Spyware.Password
v2014.12.10.02

McAfee
PWSZbot-FXD!9ECC4740ACE9
5600.6920

MicroWorld eScan
Trojan.GenericKD.1765676
15.0.0.1032

NANO AntiVirus
Trojan.Win32.Crypt.dfqtyt
0.28.6.63474

Norman
Injector.HFED
11.20141210

nProtect
Trojan.GenericKD.1765676
14.11.21.01

Qihoo 360 Security
Win32/Trojan.Dropper.3d3
1.0.0.1015

Quick Heal
Trojan.MSI.g3
12.14.14.00

Reason Heuristics
PUP.Supersoft.C
14.12.10.14

Sophos
Troj/MSIL-VZ
4.98

Trend Micro
TROJ_GEN.R0CBC0FGD14
10.465.10

VIPRE Antivirus
Trojan.Win32.Generic
35066

Zillya! Antivirus
Trojan.Crypt.Win32.15424
2.0.0.1991

File size:
1.1 MB (1,110,760 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\po.exe

Digital Signature
Signed by:

Authority:
Supersoft

Valid from:
9/30/2012 10:26:38 AM

Valid to:
1/1/2040 12:59:59 AM

Subject:
CN=Supersoft

Issuer:
CN=Supersoft

Serial number:
6B50254A40C7CFB14A405056B8F04272

File PE Metadata
Compilation timestamp:
6/29/2014 6:32:34 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:HRG2KOMUis+P4udQK4nBNwWQHgfA6evegG:HRTR8t6e+

Entry address:
0xF5EAE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
976 KB (999,424 bytes)

The file po.exe has been seen being distributed by the following URL.

Remove po.exe - Powered by Reason Core Security