ba4fb9dc4178f4d4f2d8caca6ef868f9.exe

Zoobam

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application ba4fb9dc4178f4d4f2d8caca6ef868f9.exe by Zoobam has been detected as adware by 13 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Zoobam  (signed and verified)

MD5:
edb610100a33ac05d34a4192d09da067

SHA-1:
88991136c87e1b4447720bf29eb9ebdcd92c7e7f

SHA-256:
b622b770669fa613607b4486b44c4e88d1a2b913babe16bc915be109bb1fe4c4

Scanner detections:
13 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/23/2024 11:43:59 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DownloadAdmin
2015.06.03

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

avast!
Win32:Adware-CIX [PUP]
150525-2

AVG
Generic
2016.0.3090

Clam AntiVirus
Win.Trojan.Downloadadmin
0.98/20542

Dr.Web
Trojan.Vittalia.36
9.0.1.05190

ESET NOD32
Win32/DownloadAdmin.I potentially unwanted application
7.0.302.0

F-Prot
W32/S-b0de5e09
v6.4.7.1.166

NANO AntiVirus
Trojan.Win32.XPACK.dprfbr
0.30.24.1636

Reason Heuristics
PUP.Tightrope.Bundler
15.6.2.18

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40552

File size:
736.5 KB (754,141 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\ba4fb9dc4178f4d4f2d8caca6ef868f9.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
10/16/2014 10:27:59 AM

Valid to:
10/16/2017 10:27:59 AM

Subject:
CN=Zoobam, O=Zoobam, L=Kirkland, S=Washington, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EA9D31E75E043

File PE Metadata
Compilation timestamp:
1/29/2015 2:35:11 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:C4BS2ly9NKPRdegPsgQr/745jezvROTVo80d1WU1ntTxJ10gJ1Tvz:ChhKeiHQr/s1uRCBQWMxDp

Entry address:
0x234A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 78, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, F8, FD, FF, FF, FF, 15, 30, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 2C, 77, 40, 00, 6A, 08, A3, 98, 3D, 42, 00, E8, DD, F9, FF, FF, 53, 68, 60, 01, 00, 00, A3, A0, 3C, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 0B, 74, 40, 00, FF, 15, 50, 71, 40, 00, 68, 00, 74, 40, 00, 68, A0, 34, 42, 00, E8, 5A, F3, FF, FF, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57...
 
[+]

Entropy:
7.5464

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to st-sh-us-dc3-001.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-52-97.jfk6.r.cloudfront.net  (54.230.52.97:80)

TCP (HTTP):
Connects to server-54-230-52-92.jfk6.r.cloudfront.net  (54.230.52.92:80)

TCP (HTTP):
Connects to server-54-230-52-91.jfk6.r.cloudfront.net  (54.230.52.91:80)

TCP (HTTP):
Connects to server-54-230-52-233.jfk6.r.cloudfront.net  (54.230.52.233:80)

TCP (HTTP):
Connects to server-54-230-52-104.jfk6.r.cloudfront.net  (54.230.52.104:80)

TCP (HTTP):
Connects to server-54-192-55-38.jfk6.r.cloudfront.net  (54.192.55.38:80)

TCP (HTTP):
Connects to server-54-192-55-20.jfk6.r.cloudfront.net  (54.192.55.20:80)

TCP (HTTP):
Connects to server-54-192-54-73.jfk6.r.cloudfront.net  (54.192.54.73:80)

TCP (HTTP):
Connects to server-54-192-54-208.jfk6.r.cloudfront.net  (54.192.54.208:80)

TCP (HTTP):
Connects to server-54-192-54-182.jfk6.r.cloudfront.net  (54.192.54.182:80)

TCP (HTTP):
Connects to ns237133.ovh.net  (37.59.34.142:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to a72-246-43-24.deploy.akamaitechnologies.com  (72.246.43.24:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to a173-223-205-51.deploy.static.akamaitechnologies.com  (173.223.205.51:80)

Remove ba4fb9dc4178f4d4f2d8caca6ef868f9.exe - Powered by Reason Core Security