updateyulasee.exe

Yula

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application updateyulasee.exe by Yula has been detected as adware by 7 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Yula”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Yula  (signed and verified)

Version:
1.0.5318.38548

MD5:
2cf4bb396d2acccb46504a292bfe6ad5

SHA-1:
f17827f005129487371612cd26401fe15923e879

SHA-256:
3b093344d05babea811c6d0aaf93818e06d0da5267bc8c505d22b60066ee69ff

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 10:13:57 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Zula
2015.0.3403

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14725

ESET NOD32
Win32/BrowseFox.H potentially unwanted application
7.0.302.0

IKARUS anti.virus
PUA.BrowseFox
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.Yulasee.A
v2014.07.25.11

Reason Heuristics
PUP.Yula.N
14.7.25.11

VIPRE Antivirus
Threat.4741131
31208

File size:
314.3 KB (321,816 bytes)

Product version:
1.0.5318.38548

Original file name:
Yulasee.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\yula\updateyulasee.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/15/2014 12:00:00 AM

Valid to:
3/15/2015 11:59:59 PM

Subject:
CN=Yula, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Yula, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4B2C13D47B877663487D003C021E7110

File PE Metadata
Compilation timestamp:
7/24/2014 11:25:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:m5iBn8sD7VX1PXkOYxG1JQdrE+Ms7ApuXNfVt7JpbItk:m5iBtDh1PuJxbzSa

Entry address:
0x4E59A

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
305.5 KB (312,832 bytes)

Service
Display name:
Update Yula

Type:
Win32OwnProcess


Remove updateyulasee.exe - Powered by Reason Core Security