setup.exe

Magical Find

This is the installer and setup program from the Magical Find branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by Magical Find has been detected as adware by 11 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Magical Find  (signed and verified)

Version:
2.0.5734.13855

MD5:
c60a6409f6be5617989fe813d5adda42

SHA-1:
72d0a63a01f0b325d586e6cf61656be7615ed294

SHA-256:
d56d0b036f320a70d13fe1ac5c822bfdba02712691aedd1e0845b9ab2af6645a

Scanner detections:
11 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/28/2024 8:32:26 AM UTC  (today)

Scan engine
Detection
Engine version

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Browsefox-725
0.98/21511

Dr.Web
Trojan.Yontoo.1780
9.0.1.0322

ESET NOD32
Win32/BrowseFox.AZ potentially unwanted
9.11641

herdProtect (fuzzy)
2015.11.18.16

Malwarebytes
PUP.Optional.ExpressFind.SID.A
v2015.11.18.04

McAfee
Artemis!42CA0BB3A1B4
5600.6577

Reason Heuristics
PUP.Yontoo.MagicalFind.Installer (M)
15.9.16.12

Sophos
Browse Fox
4.98

Trend Micro House Call
Suspicious_GEN.F47V0417
7.2.322

VIPRE Antivirus
Yontoo
40318

File size:
292 KB (299,056 bytes)

Product version:
2015.09.13

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\roaming\rheng\427216c60ffd4eaeb68eb5f1ecc132c5\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/19/2015 5:00:00 AM

Valid to:
6/19/2016 4:59:59 AM

Subject:
CN=Magical Find, O=Magical Find, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
66184C2A9AC2C77119C7E41AD600B84C

File PE Metadata
Compilation timestamp:
6/5/2014 4:58:31 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:6Q3PSDOnM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2p:XSCnM3D0Fw/tN8dkmLtpHHHrh78

Entry address:
0x31E4

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, E0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, B8, 6C, 44, 00, E8, 1B, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 6B, 44, 00, 8D, 44, 24, 38, 50, 53, 68, DB, 73, 40, 00, FF, 15, 58, 71, 40, 00, 68, D0, 73, 40, 00, 68, C0, 2B, 44, 00, E8, 0D, 24, 00, 00, FF, 15, AC, 70, 40, 00, 50, BF, 00, F0, 46, 00, 57, E8, FB, 23, 00, 00...
 
[+]

Entropy:
7.9412

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security