vroot.exe

File

ClIck TRuSt oPT

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application vroot.exe by ClIck TRuSt oPT has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.0118c.info.
Publisher:
ClIck TRuSt oPT  (signed and verified)

Product:
File

Version:
1.9.3.0

MD5:
955fcc9e9840dfd04fce0f8d83a84842

SHA-1:
c702129a4cda3e9714613eebedef958bdd54a025

SHA-256:
4a27ce717c424039186ebde102c838f596c0f4c60c645ff5dc36fe464b3e34d7

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/15/2024 9:44:19 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse (M)
16.11.13.2

File size:
1.1 MB (1,101,824 bytes)

Product version:
1.9.3.0

Copyright:
File

Original file name:
Ionic.Zip-2015Apr29-153947-17434c8d-d143-493e-bdb5-e6f73f0d66c9.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Common path:
C:\users\{user}\downloads\vroot.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
4/26/2015 2:00:00 AM

Valid to:
1/28/2016 12:59:59 AM

Subject:
CN=ClIck TRuSt oPT, O=ClIck TRuSt oPT, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
542C498EAE7D7639BCA1973F6AD9A196

File PE Metadata
Compilation timestamp:
4/29/2015 5:39:47 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:dbSaE4mvt/BSmviBI+KLVs6s4uXSmr7r0iO:dbSv4mvrviBI/q6s4uiy7r+

Entry address:
0x75F3E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
464 KB (475,136 bytes)

The file vroot.exe has been seen being distributed by the following URL.

http://get.0118c.info/.../1430321983/1430321983?37987445525ZF5rLTE7bDgtMS01H1s1KjIyMCskZzoqLDAtLyJpOC8hY2JjXWddaWA4dG1saGseYl9raTgwIXdiZzUr

Remove vroot.exe - Powered by Reason Core Security