specialbox.browseradapter.exe

Special Box

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application specialbox.browseradapter.exe by Special Box has been detected as adware by 30 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Special Box  (signed and verified)

MD5:
1ffb4246a87676853e23c35e8591cc8d

SHA-1:
e81cb8ca110052040b1db8f179e7d25e512d3777

SHA-256:
5722334e0faa3592841c28cdfb546beb02a30c913473c7de620cacc7d3e049fe

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/20/2024 3:04:24 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.8
678

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Generic
2015.03.29

avast!
Win32:BrowseFox-GE [PUP]
2014.9-150703

AVG
Adware AdPlugin
2016.0.3156

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15328

Bitdefender
Gen:Variant.Adware.SwiftBrowse.8
1.0.20.435

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-37332
0.98/20149

Comodo Security
TrojWare.Win32.BrowseFox.FX
21571

Dr.Web
Trojan.BPlug.934
9.0.1.087

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
8.15.03.28.05

ESET NOD32
Win32/BrowseFox.AC potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/BrowseFox
3/28/2015

F-Prot
W32/S-a777f78c
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.SwiftBrowse.8
11.2015-28-03_7

G Data
Gen:Variant.Adware.SwiftBrowse
15.3.25

K7 AntiVirus
Trojan
13.202.15414

McAfee
Program.BrowseFox-FVR
5600.6812

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.8
16.0.0.261

NANO AntiVirus
Riskware.Win32.SwiftBrowse.dnpvbt
0.30.8.659

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Yontoo.SpecialBox
15.4.14.13

Rising Antivirus
PE:Adware.SwiftBrowse!6.1A2E
23.00.65.15326

Sophos
Generic PUA OI
4.98

Trend Micro House Call
Suspicious_GEN.F47V0328
7.2.87

Vba32 AntiVirus
AdWare.MSIL.Agent
3.12.26.3

VIPRE Antivirus
Threat.4741131
37788

Zillya! Antivirus
Trojan.Katusha.Win32.36918
2.0.0.2119

File size:
103.2 KB (105,712 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\special box\bin\specialbox.browseradapter.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/22/2015 4:00:00 PM

Valid to:
2/23/2016 3:59:59 PM

Subject:
CN=Special Box, O=Special Box, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
68F233DC671BBE554282D38DFEB31C19

File PE Metadata
Compilation timestamp:
3/28/2015 3:26:49 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:zsTpawrfL7e9Fe7NgPZIeK+HkLn8B6kIaGSF:zsgiTi9FsN+PFLvGC

Entry address:
0x4535

Entry point:
E8, C5, 21, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 5D, E9, F3, 05, 00, 00, 3B, 0D, 70, 60, 41, 00, 75, 02, F3, C3, E9, 41, 22, 00, 00, 8B, FF, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 44, 23, 00, 00, 59, 85, C0, 74, 0F, FF, 75, 08, E8, 8A, 07, 00, 00, 59, 85, C0, 74, E6, C9, C3, F6, 05, F8, 74, 41, 00, 01, BF, EC, 74, 41, 00, BE, 24, 22, 41, 00, 75, 2C, 83, 0D, F8, 74, 41, 00, 01, 6A, 01, 8D, 45, FC, 50, 8B, CF, C7, 45, FC, 2C, 22, 41, 00, E8, 2C, 00, 00, 00, 68, 0E, 17, 41, 00, 89, 35, EC...
 
[+]

Entropy:
6.3887

Code size:
66 KB (67,584 bytes)

Remove specialbox.browseradapter.exe - Powered by Reason Core Security