apps hat-codedownloader.exe

Apps Hat

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application apps hat-codedownloader.exe by Sailor Project has been detected as adware by 40 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for Nero extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Nero  (signed by Sailor Project)

Product:
Apps Hat

Description:
Apps Hat exe

Version:
1000.1000.1000.1000

MD5:
497edcb0559ec726a60ae5dc539422df

SHA-1:
c215e20ca65b26415efc5f0008bbde096a0cb36a

SHA-256:
04dbde40c646c582e85815a7af7f07fb1eedad312b26174d85a8b24ea61751a4

Scanner detections:
40 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Sailor Project.

Analysis date:
11/27/2024 4:26:59 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Zusy.105499
872

Agnitum Outpost
Win32.Sality.BK
7.1.1

AhnLab V3 Security
PUP/Win32.CrossRider
2014.09.14

Avira AntiVirus
Adware/CrossRider.pq
7.11.171.238

avast!
Win32:Malware-gen
2014.9-140915

AVG
Generic
2015.0.3350

Baidu Antivirus
Adware.NSIS.Adwapper
4.0.3.14915

Bitdefender
Gen:Variant.Adware.Zusy.105499
1.0.20.1290

Bkav FE
W32.Sality.PE
1.3.0.4959

Comodo Security
ApplicUnwnt
18241

Dr.Web
Trojan.Crossrider.31451
9.0.1.0258

Emsisoft Anti-Malware
Gen:Variant.Adware.Zusy.105499
8.14.09.15.12

ESET NOD32
Win32/Toolbar.CrossRider.AM (variant)
8.10413

Fortinet FortiGate
Adware/Adwapper
9/15/2014

F-Prot
W32/Sality.gen2
v6.4.6.5.141

F-Secure
Gen:Variant.Adware.Zusy.105499
11.2014-15-09_2

G Data
Gen:Variant.Adware.Zusy.105499
14.9.24

IKARUS anti.virus
Trojan.GoogUpdate
t3scan.1.7.8.0

K7 AntiVirus
Virus
13.180.12643

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3247

Malwarebytes
PUP.Optional.VideosMediaPlayer.A
v2014.09.15.12

McAfee
Artemis!8178C5B059CB
5600.7006

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Gen:Variant.Adware.Zusy.105499
15.0.0.774

NANO AntiVirus
Riskware.Win32.AdLoad.dbdvli
0.28.0.60253

Norman
Sality.ZHB
11.20140915

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
Trj/Genetic.gen
14.09.15.12

Qihoo 360 Security
Win32/Virus.Adware.970
1.0.0.1015

Quick Heal
W32.Sality.U
9.14.14.00

Reason Heuristics
PUP.Crossrider.SailorProject.X
14.9.15.12

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14913

Sophos
Generic PUA NB
4.98

Total Defense
Win32/Sality.AA
37.0.11045

Trend Micro House Call
TROJ_GEN.F47V1224
7.2.258

Trend Micro
PE_SALITY.RL
10.465.15

Vba32 AntiVirus
Virus.Win32.Sality.bakb
3.12.26.3

VIPRE Antivirus
Crossrider
33096

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1850

File size:
1.1 MB (1,117,032 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Apps Hat.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\apps hat\apps hat-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 1:00:00 AM

Valid to:
7/19/2015 12:59:59 AM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
9/13/2014 11:05:10 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:F3zrY77EkxxeB00n8ToOu4FykmA5pSijTrl:Zz87DsBtigkz5pSijTrl

Entry address:
0x9D20A

Entry point:
E8, C7, 05, 01, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 0C, 57, 85, C9, 0F, 84, 92, 00, 00, 00, 56, 53, 8B, D9, 8B, 74, 24, 14, F7, C6, 03, 00, 00, 00, 8B, 7C, 24, 10, 75, 0B, C1, E9, 02, 0F, 85, 85, 00, 00, 00, EB, 27, 8A, 06, 83, C6, 01, 88, 07, 83, C7, 01, 83, E9, 01, 74, 2B, 84, C0, 74, 2F, F7, C6, 03, 00, 00, 00, 75, E5, 8B, D9, C1, E9, 02, 75, 61, 83, E3, 03, 74, 13, 8A, 06, 83, C6, 01, 88, 07, 83, C7, 01, 84, C0, 74, 37, 83, EB, 01, 75, ED, 8B, 44, 24, 10...
 
[+]

Code size:
795.5 KB (814,592 bytes)

Scheduled Task
Task name:
36316498-b3d9-47dd-98ae-f60936fb007c-1

Trigger:
Logon (Runs on logon)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip-50-63-202-33.ip.secureserver.net  (50.63.202.33:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.115.49:80)

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to ip-184-168-221-50.ip.secureserver.net  (184.168.221.50:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

Remove apps hat-codedownloader.exe - Powered by Reason Core Security