ytbmk_setup.exe

Ostap Laponov

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application ytbmk_setup.exe by Ostap Laponov has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex installer. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
Ostap Laponov  (signed and verified)

MD5:
ad6ee14ab2ea5fd3df5922b001f351ff

SHA-1:
576664e4abd89d55da15e1083b28852df6b4e812

SHA-256:
10d15d3fe973afeeb5bb1de76777b193709730d5aa429c9ca6d365b66a542f52

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/18/2024 9:20:19 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.WebPick.OstapLaponov.Bundler (M)
16.2.14.22

File size:
703.7 KB (720,600 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
WebPick InstalleRex

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\addons\ytbmk_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/9/2013 7:00:00 AM

Valid to:
9/10/2014 6:59:59 AM

Subject:
CN=Ostap Laponov, O=Ostap Laponov, STREET=Minskаya 16, L=Kiev, S=Kiev, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00EA64F94CDE70375038736C9F1C0960DF

File PE Metadata
Compilation timestamp:
12/3/2013 11:27:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:6tgyG9ZO6ZDjkgjwu8UNxxtGutyBQZWixTmyjs3EIezDjHoNVSZKncgYv2HS2nIh:6t376Z3ncUbxAEWiUOnPINwbghHkZ

Entry address:
0x10687

Entry point:
E8, 38, 3F, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 28, F0, 41, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 2C, F0, 41, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, DC, 07, 00, 00, 85, C0, 75, 06, B8, 90, F1, 41, 00, C3, 83, C0, 08, C3, E8, C9, 07, 00, 00, 85, C0, 75, 06, B8, 94, F1, 41, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Entropy:
7.8661  (probably packed)

Code size:
96 KB (98,304 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove ytbmk_setup.exe - Powered by Reason Core Security