OneBrowser
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 34 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 7,945 |
| First Seen: | January 27, 2026 |
| Last Seen: | May 9, 2026 |
| OS(es) Affected: | Windows |
Untrustworthy applications that manipulate browser settings without consent represent significant risks to users' online security and privacy. These programs, categorized as Potentially Unwanted Programs (PUPs), may alter how a browser functions, redirect traffic to questionable sites and track browsing activities for data collection. One such intrusive browser hijacker is OneBrowser, which interferes with user preferences and promotes dubious search engines. Understanding how it operates and spreads is essential to maintaining a secure browsing experience.
Table of Contents
What is OneBrowser?
OneBrowser is an intrusive application that modifies browser settings to force users to use unreliable search engines. Instead of delivering relevant and trustworthy search results, these engines may prioritize sponsored content, misleading advertisements, or even direct users to risky websites. The modifications imposed by OneBrowser often include changes to the default homepage, search provider, and new tab settings.
Once installed, this browser hijacker may also inject excessive advertisements into web pages, cause frequent redirects, and manipulate search queries to benefit third-party partners. Users often experience sluggish browsing performance, unwanted pop-ups, and difficulty reverting their browser settings.
How OneBrowser Affects Browsing Experience
OneBrowser's presence on a system introduces multiple inconveniences and security concerns. Users may encounter:
- Forced Redirects: Search queries and website visits could be redirected to dubious search engines or affiliate pages that generate revenue for the operators behind OneBrowser.
- Intrusive Advertisements: Pop-ups, banners, and in-text advertisements may appear frequently, leading to questionable offers, deceptive pages or even fake promotions.
- Data Tracking Risks: The browser hijacker might monitor browsing habits, search history, and personal details. Collected data could be used for targeted advertising or even sold to third parties.
- Difficult Manual Removal: Users attempting to restore their browser settings manually may find that OneBrowser persists, sometimes reinstating itself even after uninstallation attempts.
Questionable Distribution Tactics of PUPs
PUPs like OneBrowser often do not rely on direct user downloads but instead spread through misleading distribution tactics, making them difficult to detect before installation. Common methods include:
- Software Bundling: OneBrowser may be hidden within installers of free applications from third-party websites. Users who rush through installation processes without reviewing options may unknowingly allow it onto their systems.
- Fake Software Updates: Fraudulent update prompts claiming to offer necessary patches for browsers, media players, or other software may secretly install OneBrowser instead.
- Fraudulent Advertisements: Clicking on deceptive ads promising free services, giveaways, or performance improvements might lead to the unintentional download of intrusive software.
- Compromised Websites: Visiting specific untrustworthy sites may trigger automatic scripts that attempt to install unwanted browser extensions or modify browser settings.
Strengthening Defenses against Browser Hijackers
To minimize the risk of encountering PUPs like OneBrowser, users should take proactive security measures, including:
- Careful Software Installation: Always choose 'Custom' or 'Advanced' settings during software installations to identify and decline bundled offers.
- Avoiding Suspicious Advertisements and Links: Avoid clicking on pop-ups or promotional content from unknown sources, as these may lead to deceptive downloads.
- Keeping Software Updated: Ensure that browsers and essential software are updated only from official sources to prevent exposure to fake update scams.
- Using Reliable Security Tools: Security software with real-time protection may help detect and prevent unauthorized browser modifications.
- Regularly Reviewing Extensions and Settings: Periodically check installed browser extensions and reset browser settings if any unauthorized changes are detected.
By staying vigilant and implementing these security practices, users can better protect themselves from intrusive browser hijackers and maintain control over their browsing experience.
Registry Details
Directories
OneBrowser may create the following directory or directories:
| %localappdata%\ob |
| %localappdata%\onebrowser |
| %programfiles%\ob |
Analysis Report
General information
| Family Name: | OneBrowser |
|---|---|
| Signature status: | Self Signed |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
e810fdd67f792f51677eb41147031d1e
SHA1:
64eaeeb21a0a88ecde826f57305af566909e8c97
SHA256:
6E1F84E3B1A1681C7FD2E643130433DBA9E12D442A433B0FC714E9FFC84D7FD0
File Size:
6.77 MB, 6766600 bytes
|
|
MD5:
04871138a46b1e55c4898530c95be835
SHA1:
cde11f7d08536e148b8c70182cb66a389200f9d8
SHA256:
DF1B14CCD5D08C61E8BB2327D1AF264E09D7274C49F21D84E6141209875ACF71
File Size:
15.37 KB, 15368 bytes
|
|
MD5:
952071dcb852425349ad191050699518
SHA1:
b5825f3a889b9e1b0cf380230158ca16f62184c1
SHA256:
0055AE7323E8FBC5FAD5FC3E651929DEBF6EBB82D2CF3C885C71ED03E4E8A336
File Size:
4.25 MB, 4251144 bytes
|
|
MD5:
0eb3d14380dd71d54dff49a641b48036
SHA1:
7f06413aa0b71f815e49f63944d84cf7e0c926a8
SHA256:
1A2E843630CE3CF0AB4FCEC4D4A259FEFD792EF2C0BB108A1E658B23CA5F781A
File Size:
4.07 MB, 4070408 bytes
|
|
MD5:
c5f5c43c21d5e96466bc89f636369faa
SHA1:
76ff31a1625519f9cfe7e950abfb80412f4c2918
SHA256:
A40D4C0285751682187667B96CDB9C2ED036FD4C275B05B07BA41E3F6C8ECFBF
File Size:
12.82 KB, 12816 bytes
|
Show More
|
MD5:
9d99e2bb05e6983e4c9d8d0d1384b29f
SHA1:
bb4f803c2dc0c75657c6683bf4b53d3bede9e3c6
SHA256:
7169C12461282FFD238DFAC0908F48680E479894187A64D0EA574FBA900FA8AA
File Size:
103.84 KB, 103840 bytes
|
|
MD5:
4cacef2c307a98bb584b065485f6419d
SHA1:
0624e96b1303911965f4857b146f75d2965a0fe2
SHA256:
FAF7AB545E70A97E5BCC3C58A98962D27C91AA96E8AE0994CF27AD5E5D964917
File Size:
12.82 KB, 12816 bytes
|
|
MD5:
421111e2e972c2dc02509565dfe58b9a
SHA1:
0ca767ac8acb598cdedd6ad711234ab74f68389c
SHA256:
7016BD65896DA09D15CDA98C974D9F7AEA9F7A1EC1B8BA89BBA6B6E024DCE6E9
File Size:
104.35 KB, 104352 bytes
|
|
MD5:
483f9c126954a555c10f26f976a32f50
SHA1:
33eba8b9ed316a3718b90e72d37819986d249b9a
SHA256:
64EC17CF92438D0A961CC67B367E5D3F499DCD4E90A3239D81B685D18E80AD8E
File Size:
3.31 MB, 3309584 bytes
|
|
MD5:
48d3eb964fd9b62572d77e98a8a6aa15
SHA1:
649e71c6405a5f4ba101c7cd50f336492d8438b3
SHA256:
40BBF1D5AE1CF313AA31467BDB51F3A7D1D412BF3A5C262D6AB481F089D887C5
File Size:
12.82 KB, 12816 bytes
|
|
MD5:
dba03ab3be9f17a389166b7369e2acc4
SHA1:
57e9c9c3b26315504cddbcb43f9d54722505ec4d
SHA256:
48AC6CC9978B7F63F23D6420F76BBCAC97243D16D19C25C9D5ADCA47FBF587A3
File Size:
91.66 KB, 91664 bytes
|
|
MD5:
78c66c9be1bef8db266c0dfca55640ae
SHA1:
3d7ec646ef62f1ccf613da86163db98a2cf5a856
SHA256:
55EDBBE4767D8375CE732893478CA78FAF0B3C2CE44E169AD18E55C66533B03D
File Size:
4.25 MB, 4251144 bytes
|
|
MD5:
a36f5d837ad1411aadd1d051564a07b7
SHA1:
cbdaea221176488c5d69fbe8ebc869b59c4a5ab0
SHA256:
B44B6C273DA470D8BC9A6D21501CCCD7E32DA794A91F02EB2F0A7428F2F7E510
File Size:
6.84 MB, 6839816 bytes
|
|
MD5:
5aa120ee57bf8dbe30e78ced9d1c7e0f
SHA1:
b60364cde63fc62fd33cd4b782926f33f7d6d126
SHA256:
9BEC78B77027742A72E215AC24775F7CC27930987333D47C60A6BD953A3F58C9
File Size:
6.85 MB, 6854152 bytes
|
|
MD5:
b912ff7b2e3bafff09e790b5c6325034
SHA1:
9ca5c68665f67646d361349af0b48332e69b28a4
SHA256:
58593A82A2E26D37CF4752985CD38B4DCD1E15720664E0C4A45E9D18C2EB7C94
File Size:
15.37 KB, 15368 bytes
|
|
MD5:
3137246262b9b0467ecc01033147cf28
SHA1:
788d0f7d5253e84c34a220e92dbcb5866cd0f713
SHA256:
7308680634A887944EFE20288C5A187DE6F1BD9CBCC81A62B2F88601ABAB1242
File Size:
5.43 MB, 5432840 bytes
|
|
MD5:
3f3e0fedb534c5b8b2b5a04e7a021f17
SHA1:
8cc5ce48e553e73d798f2ce178c96c177f07ac15
SHA256:
493E6B44B84ACCFC38C05C9C1011B944E9AB4115830D8D8A3EFA35A76DD901B2
File Size:
6.85 MB, 6854664 bytes
|
|
MD5:
bad70f661b1a50f4d5785e1680c60ebf
SHA1:
0feb753ffec52f6c8e7f50a4c9146a0b8a4b87a2
SHA256:
67107FB66F5C8BB5601F35A7E6B16D84A6920F3A2A639ADFC848DAA221295795
File Size:
4.80 MB, 4800008 bytes
|
|
MD5:
1e17bf103f32f7406c73ddbbd6da1618
SHA1:
160fac2e0905ec8f3128439b99b2a255994d6af8
SHA256:
3D396E49DB2395547B7B23DF2B9DBC8928A09300A9E455DF27D46A3BBBDEEEAF
File Size:
3.37 MB, 3373064 bytes
|
|
MD5:
3654eb0cc6e4caf49709a06cffb87932
SHA1:
93bd5ab386c328249179781710dcbd16f96cbb40
SHA256:
91ABCF473E6D0C68519B911D7A87A16C2AEB744520BA71FCA5CC3859068E56B8
File Size:
4.80 MB, 4800008 bytes
|
|
MD5:
be43e3ecfdfe09d3652cdf982a89506a
SHA1:
f2b2f2e4a994a5c0d1db4245b7f9d34d685abe85
SHA256:
9437A1E6BE6BC6C7A9F9EF9F626CF22DDAF577BB490A431984313C89C5E0EB4B
File Size:
4.40 MB, 4404128 bytes
|
|
MD5:
79a53ad54109938cc7a719aed40308d1
SHA1:
33bc9d3e704d4df6e1b990f92759f590d51f40a6
SHA256:
14F867858C8136C1F27DA6A5E2076F59BFE22C0DD14A0B3F37267726CA7A9CE2
File Size:
4.80 MB, 4803592 bytes
|
|
MD5:
2dd98794fb9899a0e049abb3740112f3
SHA1:
54ed54fc13e122cfc5e6d3308d2b7a08109270d0
SHA256:
8D0AFBF2170365F183652E30665F7BB49AF2E9EF97E386357C2E701950A7381C
File Size:
1.13 MB, 1125384 bytes
|
|
MD5:
4e64a6b07cad0374c5c669db6033f00a
SHA1:
c751a871a85ed16977f37f0368b7957fef8780fa
SHA256:
03A1954EF413E1A0E726EE5F698BE789A8F73B177B16B7D368EB25DC08B6251A
File Size:
6.39 MB, 6394376 bytes
|
|
MD5:
8be3bab07f56a27340d3c4085199b328
SHA1:
580a6926fb10643b051732342154f00e8ec89834
SHA256:
E5E27D211DEF4402191DF38965E617DB3D4119214AC6312BC2F57035B2F39171
File Size:
1.13 MB, 1125384 bytes
|
|
MD5:
22e7ed32ef96aed2c586e3e1bcdb09ba
SHA1:
60ef5f005679bcc5840f0db732ae7e36986a6869
SHA256:
946092B728161763441081F2D566647810A2CF22D45EB7CA88BA54C9CE96200D
File Size:
12.82 KB, 12816 bytes
|
|
MD5:
77e27eb2a734029549a7e99e01d94bf7
SHA1:
8b9f6944c9e309f0fa4aeb63585368810d2b9cc9
SHA256:
D72A2FFE92066E02B1E66C292CAF3CDCA5B85446D0E9E7E056B07F651E8CAB25
File Size:
4.79 MB, 4785664 bytes
|
|
MD5:
cc53180a0cf9a64c18337b29cbe72b2f
SHA1:
1be5742e97ba1c4bbf96b6edeb6ec5748bc7ec0e
SHA256:
CC16C93EB4DAFB329ECE937A9CFCF844E72D27E52DA50F094B74EE16D657D2C6
File Size:
6.36 MB, 6355976 bytes
|
|
MD5:
631bcb8ac338d0d9af71f58f24e43e06
SHA1:
a8040ff82646b15d77cccd7d8ada3a136baf82e8
SHA256:
DEA2F01D1A8A43636596A0766FBF61DEB1705D97F94878C058917FB65DE10D1B
File Size:
4.78 MB, 4779584 bytes
|
|
MD5:
8177a190a97f9e8d395a4d52a1e04732
SHA1:
c48d96b8444bf2b6c96317c3a92f1eb20ea325b4
SHA256:
8E68C92FB203A835774A038FEE0140035227D8CC13AFE66FFB8438DBE15E95B0
File Size:
1.09 MB, 1093128 bytes
|
|
MD5:
83200f4fd455cf9563094a6bddaf701c
SHA1:
5bbff61f436e12b4158b8afddec110074ed1dc13
SHA256:
78537CF18FFF61171102194C1F7E83871E7132C57C0509745F16DDA96EAA4127
File Size:
4.81 MB, 4806224 bytes
|
|
MD5:
8f6401fd5416fbd0f9beb6ee831336cb
SHA1:
fa527f255dc7b2d574fd8d9054d2d9d03208c230
SHA256:
9031E155F9E9502ADD6D802AE4F9E750187DF6EDE797510677E64719C73B3BA9
File Size:
6.36 MB, 6357512 bytes
|
|
MD5:
ef5f5eef9fc436caffbaf5dc2752c305
SHA1:
b747fb4415891770fb0980b664f7fd7f71505a8c
SHA256:
BBBFA59D700625F0CB13DD983D1D9C08A0067401BF6D4A447CEF3AB3563FD76F
File Size:
6.36 MB, 6358024 bytes
|
|
MD5:
8e4c11994d82fc83a2625cb4e94333eb
SHA1:
4b65999bafa09782dc8f5469645368b2b70cf475
SHA256:
9E84E4CF50BC69A8694381F2EF91A7AE697A36FA666EB51386EF20C74DC0E114
File Size:
4.78 MB, 4782096 bytes
|
|
MD5:
a4156b8ded211bee377c0c358719d537
SHA1:
bb1d154ec7eb2afe6838710b5d13d370047ba069
SHA256:
9CD72886F67D66C461C52193A6EE484825DF2568DF5034177B0FBEE7A9B758DD
File Size:
4.79 MB, 4786096 bytes
|
|
MD5:
92c84c26710dd680979a6b618b3f7d23
SHA1:
62ab04a4c0e77260c6ad7e9c4ff5df160d087590
SHA256:
3D37E95B2B622D3D84E6505F48DB641A8674520DFB70A33EE1832F7332784E7A
File Size:
6.34 MB, 6340104 bytes
|
|
MD5:
dffe7a4a9cb056f6f71bb739cdf1ff5d
SHA1:
7404a6fec8e3c7c1fe535fff4fdcc4266224f064
SHA256:
1FD27E9A208AD1C11A19992E90ECD833B0A371B915D4CC234880E5B711FC5B3D
File Size:
6.37 MB, 6368264 bytes
|
|
MD5:
fc7e187cce29f07ef2ce72884357f4f2
SHA1:
b18466e39fb647a643d45520800da110f5ca5ee1
SHA256:
DD9AEDDBE60A6510E4381791A34A2B0322B67279A2762C989908565C321581B2
File Size:
4.79 MB, 4791664 bytes
|
|
MD5:
f7de35764c38328ea298e03879f0512c
SHA1:
d404f62b045217b5666a48d8a163fc2a307f624c
SHA256:
48800AF6A7FE9351BD8D6512D2EB9525F9D4905EA231EB6BF5CF8CF6910599B2
File Size:
4.78 MB, 4780080 bytes
|
|
MD5:
85fa94e89236e2a579a7270535e1a286
SHA1:
3ac282ba9953c8c18de356967714e442287b49af
SHA256:
4B5F4C3738222374DD215B438A364DC432ACC78D26C1C87B4BE628CB94D7CC15
File Size:
6.33 MB, 6330376 bytes
|
|
MD5:
d7088bdf86ba8b0c3986052cb304590d
SHA1:
c92f1618edd17709bbd9fd7e962094464653a722
SHA256:
3E08AF0B519B65632A26CD6B8D1092C6B437865722DA9107938B58238954C8B5
File Size:
6.43 MB, 6434312 bytes
|
|
MD5:
45564e53f6cfffda92307d9f6491c116
SHA1:
049ffaba2dd8e6351603d799c95c262a88da2b80
SHA256:
3188FEFF7C735121E440E83F550BE6D270ABDA338E5619E9D8E4DD0EE345ADA0
File Size:
4.87 MB, 4867664 bytes
|
|
MD5:
b79cb8ab4ba77e28efcb1a639ac5bf7d
SHA1:
6ffed8d461c98c0c38d2a7f2273f031bf98ab74f
SHA256:
508DBD18F539D681004A07443C8B5D812F3924586C9A33010069FEBC6F3EE67E
File Size:
6.35 MB, 6351880 bytes
|
|
MD5:
7884342ae405b6ce6467da589c90e355
SHA1:
f61def98539ae152e53707f3e403ab76bb359172
SHA256:
405453417C7E570BE27D7EDBB6CC284629B107CA08242974778091FBDB13B0FE
File Size:
1.09 MB, 1094664 bytes
|
|
MD5:
de65aabcb1de7dd4a981fb03d18b84c3
SHA1:
e5ee7c2f07a526851676573c2cb2d2ac042e83fb
SHA256:
479725DA5C4099960CD4FBBC9A1CAAE143A17C88F4962CA64FD672156645A837
File Size:
14.86 KB, 14856 bytes
|
|
MD5:
1d5e29c75b65681eb592cd06c4738d06
SHA1:
33fb7f0a248c5262359eb104ff465f9f778c169d
SHA256:
138C92DE1F22CF2A3F85B3AB2A0E2E3FDBB75651B980A8F30A90DE97172969B3
File Size:
984.58 KB, 984584 bytes
|
|
MD5:
5a48fadbd8ff678f2a190521501b5b17
SHA1:
7cc00da47c4982c716073bc7c52d2978530ac6a2
SHA256:
77C100FE8F0CBEEB69BAEBAA726A5727E2D7947C37DE8C7DB02F3BE25BD78855
File Size:
4.95 MB, 4946048 bytes
|
|
MD5:
1c253ab9fd2c1cbef193826cc840b400
SHA1:
c140f1af4a7c53549d31f51bf46a99283f8e78ff
SHA256:
CF983548547DDAF5A343AFC8BD3549C86C7E42D3760D88E14B71124E07A625AE
File Size:
4.90 MB, 4899600 bytes
|
|
MD5:
3e7a97e727d9c295b76841d91083763f
SHA1:
b13542a46f67384b8140f3a22fd028bb418d07c0
SHA256:
9840CF002AA15970AE67866D7168B31F6C82C36E7245960483C6F361E82740D8
File Size:
96.78 KB, 96776 bytes
|
|
MD5:
7a0bbb50c7e7ec2c4665b022fc5ba537
SHA1:
c2ea6d0cb3be884a5fbf8d59b5f9afedbe802cc1
SHA256:
E6446E3E120BEE9E2C9099AEC0FCD42D36B53F2FC464D8BE0C8CB4B78F7167B1
File Size:
1.12 MB, 1121288 bytes
|
|
MD5:
51e7958d1792922a7c7507a64791aa6e
SHA1:
1f3f0e5350fed5a6aa76cb49d137ac9f5227aee0
SHA256:
877A0E189FE260AF5018F398F7627A057166BE6BDD4B9C992C49B212EEC3599B
File Size:
15.37 KB, 15368 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
Show More
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name |
|
| Company Short Name |
|
| File Description |
|
| File Version |
|
| Internal Name |
|
| Last Change |
|
| Legal Copyright |
Show More
|
| Official Build | 1 |
| Original Filename |
|
| Product Name |
Show More
|
| Product Short Name |
|
| Product Version |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Work Product Inc. | GoGetSSL G4 CS RSA4096 SHA256 2022 CA-1 | Self Signed |
| WORK PRODUCT, INC. | SSL.com EV Code Signing Intermediate CA RSA R3 | Self Signed |
| Chickadee Digital, LLC | Sectigo Public Code Signing Root R46 | Root Not Trusted |
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 4 |
|---|---|
| Potentially Malicious Blocks: | 0 |
| Whitelisted Blocks: | 2 |
| Unknown Blocks: | 2 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.AN
- Kryptik.CBX
- Kryptik.CBXA
- OneBrowser.A
- ShellcodeRunner.IB
Show More
- Trojan.Agent.Gen.AJG
- Trojan.Agent.Gen.APA
- Trojan.Agent.Gen.BNV
- Trojan.Agent.Gen.SX
- Trojan.Downloader.Gen.SA
- Trojan.Kryptik.Gen.COR
- Trojan.Kryptik.Gen.DGK
- Trojan.Kryptik.Gen.DZB
- Trojan.ShellcodeRunner.Gen.FF
- Trojan.ShellcodeRunner.Gen.NW
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\downloads\72fa0ff3_obupdate.conf | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\software\wow6432node\onebrowser::hb | RegNtPreCreateKey | |
| HKLM\software\wow6432node\onebrowser::72fa0ff3_installid | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Network Wininet |
|
| Anti Debug |
|
| Network Winhttp |
|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Service Control |
|
| Network Winsock2 |
|
| Network Winsock |
Show More
|
| Encryption Used |
|
| User Data Access |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\cde11f7d08536e148b8c70182cb66a389200f9d8_0000015368.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\76ff31a1625519f9cfe7e950abfb80412f4c2918_0000012816.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\bb4f803c2dc0c75657c6683bf4b53d3bede9e3c6_0000103840.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\0624e96b1303911965f4857b146f75d2965a0fe2_0000012816.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\0ca767ac8acb598cdedd6ad711234ab74f68389c_0000104352.,LiQMAxHB
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\649e71c6405a5f4ba101c7cd50f336492d8438b3_0000012816.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\57e9c9c3b26315504cddbcb43f9d54722505ec4d_0000091664.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\9ca5c68665f67646d361349af0b48332e69b28a4_0000015368.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\60ef5f005679bcc5840f0db732ae7e36986a6869_0000012816.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\e5ee7c2f07a526851676573c2cb2d2ac042e83fb_0000014856.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\b13542a46f67384b8140f3a22fd028bb418d07c0_0000096776.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\1f3f0e5350fed5a6aa76cb49d137ac9f5227aee0_0000015368.,LiQMAxHB
|