2da4200944bf5c6ab06e820d1dca9dad.exe

The application 2da4200944bf5c6ab06e820d1dca9dad.exe has been detected as a potentially unwanted program by 13 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
MD5:
4b2431c172e16395d970c11d55342dad

SHA-1:
35204dbb08a2e59e1d5cb5f8322a96e02c77bbf3

SHA-256:
6b32d106f32baef9eebb8028a54d5aa608da9e7b6b1a77489cb500e8bfe2535c

Scanner detections:
13 / 68

Status:
Potentially unwanted

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Analysis date:
11/5/2024 10:01:57 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DownloadAdmin
2015.06.04

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

avast!
Win32:Adware-CIX [PUP]
150602-1

AVG
Generic
2016.0.3089

Clam AntiVirus
Win.Trojan.Downloadadmin
0.98/20547

Dr.Web
Trojan.Vittalia.36
9.0.1.05190

ESET NOD32
Win32/DownloadAdmin.I potentially unwanted application
7.0.302.0

F-Prot
W32/S-b0de5e09
v6.4.7.1.166

NANO AntiVirus
Trojan.Win32.XPACK.dprfbr
0.30.24.1636

Reason Heuristics
Threat.Win.Reputation.IMP
15.6.3.13

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40786

File size:
715.5 KB (732,668 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\2da4200944bf5c6ab06e820d1dca9dad.exe

File PE Metadata
Compilation timestamp:
1/29/2015 6:35:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:d4BS2ly9NKPRdegPsgQr/745jezvROTVo80d1WU1ntTxJ10gJ1Tvzx:dhhKeiHQr/s1uRCBQWMxDpx

Entry address:
0x234A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 78, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, F8, FD, FF, FF, FF, 15, 30, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 2C, 77, 40, 00, 6A, 08, A3, 98, 3D, 42, 00, E8, DD, F9, FF, FF, 53, 68, 60, 01, 00, 00, A3, A0, 3C, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 0B, 74, 40, 00, FF, 15, 50, 71, 40, 00, 68, 00, 74, 40, 00, 68, A0, 34, 42, 00, E8, 5A, F3, FF, FF, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to st-sh-us-dc3-001.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-52-233.jfk6.r.cloudfront.net  (54.230.52.233:80)

TCP (HTTP):
Connects to server-54-230-52-224.jfk6.r.cloudfront.net  (54.230.52.224:80)

TCP (HTTP):
Connects to server-54-192-55-20.jfk6.r.cloudfront.net  (54.192.55.20:80)

TCP (HTTP):
Connects to server-54-192-54-185.jfk6.r.cloudfront.net  (54.192.54.185:80)

TCP (HTTP):
Connects to server-54-192-54-183.jfk6.r.cloudfront.net  (54.192.54.183:80)

TCP (HTTP):
Connects to ns237133.ovh.net  (37.59.34.142:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to a72-246-43-24.deploy.akamaitechnologies.com  (72.246.43.24:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-62-236-187.deploy.static.akamaitechnologies.com  (23.62.236.187:80)

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)

Remove 2da4200944bf5c6ab06e820d1dca9dad.exe - Powered by Reason Core Security