updater.exe

Strong Signal

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application updater.exe by Strong Signal has been detected as adware by 17 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Mgr StrongSignal”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Strong Signal  (signed and verified)

Version:
1.0.5536.30994

MD5:
f9c45a91edda769f95e5f7dc5064bb24

SHA-1:
6df88aab2f156b88aee1a076ede7994b1ed72480

SHA-256:
3e729cd48f16fc832b24f7ee024f857168721dc629cb91dc347a596fbc110621

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 3:10:44 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/BrowseFox.388856.5
7.11.213.4

AVG
Generic
2016.0.3185

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15227

Bitdefender
Adware.BrowseFox.BX
1.0.20.305

Bkav FE
W32.HfsAdware
1.3.0.6379

Emsisoft Anti-Malware
Adware.BrowseFox.BX
8.15.03.02.07

ESET NOD32
Win32/BrowseFox.AF potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/BrowseFox
3/2/2015

F-Secure
Adware.BrowseFox.BX
11.2015-02-03_2

G Data
Win32.Application.Browsefox
15.2.25

K7 AntiVirus
Unwanted-Program
13.1915120

MicroWorld eScan
Adware.BrowseFox.BX
16.0.0.183

nProtect
Adware.BrowseFox.BX
15.02.27.01

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Reason Heuristics
PUP.Service.Yontoo
15.2.27.20

Sophos
Positive Finds
4.98

VIPRE Antivirus
Trojan.Win32.Generic
38018

File size:
379.7 KB (388,856 bytes)

Product version:
1.0.5536.30994

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\common files\0780f478-67ce-4ec3-98db-39a65f4618ce\updater.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/11/2014 7:00:00 PM

Valid to:
12/12/2015 6:59:59 PM

Subject:
CN=Strong Signal, O=Strong Signal, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5047EE0477D4F273DFC93DB8A749B9E0

File PE Metadata
Compilation timestamp:
2/27/2015 8:13:15 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:0qIPvOSzmzpIKXKxPzwlcVtlKhte47r6u2hsBuXwVs6KPKIFd+ml4Vl1:EPvbmzpIKcPsUurHKjcuXwy6Zg2Vl1

Entry address:
0x1AE53

Entry point:
E8, 53, D3, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 20, B2, 45, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 94, 98, 45, 00, 01, 0F, 82, 8F, D4, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02...
 
[+]

Entropy:
6.4958

Code size:
278 KB (284,672 bytes)

Service
Display name:
Update Mgr StrongSignal

Type:
Win32OwnProcess

Depends on:
RPCSS


Remove updater.exe - Powered by Reason Core Security