Our sensors just picked up a rogue advertisement served through the Yieldmanager ad network, which exposes users to fake Adobe Flash Player HD ads, ultimately dropping a copy of the potentially unwanted application (PUA)/adware, known as Somoto Better Installer.

More details:

Sample screenshot of the actual advertisement:

Fake_Flash_Player_HD_02_Adware_Somoto

Surprisingly, once users click, they’re presented with a rogue Free Media Player page, instead of of a Adobe Flash Player HD themed page. Users who fall victim to the social engineering scam will end up installing multiple potentially unwanted applications.

Yieldmanager ad URL:
hxxp://ad.yieldmanager.com/clk?3,eJyljd1ugkAQhZ.GO0qWv7Bk04tBpEpZBbOVyN2yQkWxEt10I0.fJbS-QE8mZ07mJ5.lENygA8duhZE4uNwVxHLqwKu9qmkqAxFCHOT7VuBbXmAsH4mEZLt4z-d1MogQRqX9huUw6XO01ZQzPHoI9-Ir-92fXiib0ry33yj8Q7dd-AfVPKXREYbMN7uOueHzKhIPGoFaX1Z2WiTHDVtIyuKOtsgri48hZfFpP8TnkgFaR9u2zJ-fr4ZxlLKfOTCzY11KKZPfJe.4d6ubKa4XPf0Bx21b5Q==,

Landing domain:
hxxp://www.softigloo.com – 78.138.105.151. Responding to the same IP is also the following typosquatted domain – hxxp://down1oads.com

Fake_Flash_Player_HD_01_Adware_Somoto

Detection rate for the sampled malware:
MD5: 3ee49800cc3c2ce74fa63e6174c81dff – detected by 8 out of 46 antivirus scanners as Somoto BetterInstaller; Adware.Somoto
MD5: b57cc4b5aecd69eb57063f4de914d4dd – detected by 8 out of 46 antivirus scanners as 8 out of 46 antivirus scanners as Somoto BetterInstaller; TROJ_GEN.F47V0429

Fake_Flash_Player_HD_Adware_Somoto

Once executed, MD5: b57cc4b5aecd69eb57063f4de914d4dd creates the following files on the affected hosts:
C:DOCUME~1<USER>~1LOCALS~1Tempnsh2.tmp
C:DOCUME~1<USER>~1LOCALS~1Tempbiclient.exe
C:DOCUME~1<USER>~1LOCALS~1Tempconfig.ini
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.0
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.2
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.5
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.4
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.3
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.6
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.7
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe.1
C:DOCUME~1<USER>~1LOCALS~1Tempbundlesweetimsetup.exe
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.0
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.1
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.2
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.3
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.4
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.5
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.6
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe.7
C:DOCUME~1<USER>~1LOCALS~1TempDeltaTB.exe
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.0
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.2
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.1
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.3
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.4
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.5
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.6
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe.7
C:DOCUME~1<USER>~1LOCALS~1TempLollipopInstaller_somoto_14693.exe
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.2
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.3
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.4
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.5
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.0
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.1
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.6
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe.7
C:DOCUME~1<USER>~1LOCALS~1TempLyricsPal.exe
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.0
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.1
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.2
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.3
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.4
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.7
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.5
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe.6
C:DOCUME~1<USER>~1LOCALS~1Temp7z920.exe

Creates the following Mutexes:
CTF.LBES.MutexDefaultS-1-5-21-1275210071-920026266-1060284298-1003
CTF.Compart.MutexDefaultS-1-5-21-1275210071-920026266-1060284298-1003
CTF.Asm.MutexDefaultS-1-5-21-1275210071-920026266-1060284298-1003
CTF.Layouts.MutexDefaultS-1-5-21-1275210071-920026266-1060284298-1003
CTF.TMD.MutexDefaultS-1-5-21-1275210071-920026266-1060284298-1003

Makes the following DNS requests:
bi.bisrv.com (78.138.97.8)
installercdn.filebulldog.com (54.239.158.183)
static.bisrv.com (78.138.97.8)
cdn.bisrv.com (54.239.158.151)
cdn.bispd.com (78.138.127.129)
installercdn.betterinstaller.com (54.239.158.63)
installer.betterinstaller.com (78.138.97.8)
download.filesfrog.com (78.138.127.7)

And initiates the following TCP connections:
78.138.97.8:80
54.239.158.55:80
78.138.127.129:80
54.239.158.183:80
54.239.158.247:80
78.138.127.7:80

The affiliate network participant that’s abusing the Yieldmanager ad network is currently earning revenue through the Somoto’s BetterInstaller PPI (Pay-Per-Install) revenue sharing network:

BetterInstaller

Somoto_BetterInstaller

We’ll be definitely keeping an eye on this PPI revenue-sharing network, especially on the deceptive advertising done on behalf of its participants.

You can find more about Dancho Danchev at his LinkedIn Profile. You can also follow him on Twitter.

Blog Staff

About the Author

Blog Staff

The Webroot blog offers expert insights and analysis into the latest cybersecurity trends. Whether you’re a home or business user, we’re dedicated to giving you the awareness and knowledge needed to stay ahead of today’s cyber threats.

Share This