bdc75287-990c-4562-9359-42a7584090a3-10.exe

PalMall

ColoColo Apps (Bright Circle Investments Ltd)

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application bdc75287-990c-4562-9359-42a7584090a3-10.exe by ColoColo Apps (Bright Circle Investments) has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
BND  (signed by ColoColo Apps (Bright Circle Investments Ltd))

Product:
PalMall

Description:
PalMall exe

Version:
1000.1000.1000.1000

MD5:
a0642c8b94d63a7463706fb1b44b651e

SHA-1:
5997ea2a6e2e36bd5f6cf2316d87f35e93318809

SHA-256:
8cf018d9ddf76e4e0ac4e782ed7cd69455c0bfc29acc95429c74db1997c3efd8

Scanner detections:
1 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
12/25/2024 5:26:51 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Crossrider.Brightcircle (M)
16.2.20.3

File size:
1.2 MB (1,211,864 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
PalMall.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\palmall\bdc75287-990c-4562-9359-42a7584090a3-10.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
12/15/2014 10:00:00 PM

Valid to:
12/16/2015 9:59:59 PM

Subject:
CN=ColoColo Apps (Bright Circle Investments Ltd), O=ColoColo Apps (Bright Circle Investments Ltd), STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D815C7CD687694A6F4119A3535D31D7A

File PE Metadata
Compilation timestamp:
1/27/2015 9:06:15 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:P+s6b/BfxIuxzEq1yxzdHYYtdu2lTppSDlqeSoXTjqgq0v:/6f9z/Ixht82lTppSDlqeSoXTjPq0v

Entry address:
0x95DAD

Entry point:
E8, AB, FE, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 58, D9, 50, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 58, A1, 50, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 58, D9, 50, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8...
 
[+]

Code size:
761.5 KB (779,776 bytes)

Scheduled Task
Task name:
bdc75287-990c-4562-9359-42a7584090a3-10_user

Trigger:
Logon (Runs on logon)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-52-85-63-186.lhr50.r.cloudfront.net  (52.85.63.186:80)

TCP (HTTP):
Connects to server-52-85-63-241.lhr50.r.cloudfront.net  (52.85.63.241:80)

TCP (HTTP):
Connects to server-52-85-63-99.lhr50.r.cloudfront.net  (52.85.63.99:80)

TCP (HTTP):
Connects to server-52-85-63-170.lhr50.r.cloudfront.net  (52.85.63.170:80)

TCP (HTTP):
Connects to server-52-85-63-75.lhr50.r.cloudfront.net  (52.85.63.75:80)

TCP (HTTP):
Connects to server-52-85-63-247.lhr50.r.cloudfront.net  (52.85.63.247:80)

TCP (HTTP):
Connects to server-52-85-63-172.lhr50.r.cloudfront.net  (52.85.63.172:80)

TCP (HTTP):
Connects to server-52-85-63-103.lhr50.r.cloudfront.net  (52.85.63.103:80)

TCP (HTTP):
Connects to server-52-85-63-50.lhr50.r.cloudfront.net  (52.85.63.50:80)

TCP (HTTP):
Connects to server-52-85-63-246.lhr50.r.cloudfront.net  (52.85.63.246:80)

TCP (HTTP):
Connects to server-52-85-63-140.lhr50.r.cloudfront.net  (52.85.63.140:80)

TCP (HTTP):
Connects to server-54-230-187-135.cdg51.r.cloudfront.net  (54.230.187.135:80)

TCP (HTTP):
Connects to server-52-85-63-65.lhr50.r.cloudfront.net  (52.85.63.65:80)

TCP (HTTP):
Connects to server-52-85-63-254.lhr50.r.cloudfront.net  (52.85.63.254:80)

TCP (HTTP):
Connects to server-52-85-63-181.lhr50.r.cloudfront.net  (52.85.63.181:80)

TCP (HTTP):
Connects to server-52-85-63-115.lhr50.r.cloudfront.net  (52.85.63.115:80)

TCP (HTTP):
Connects to server-54-230-187-23.cdg51.r.cloudfront.net  (54.230.187.23:80)

TCP (HTTP):
Connects to server-52-85-63-89.lhr50.r.cloudfront.net  (52.85.63.89:80)

TCP (HTTP):
Connects to server-52-85-63-77.lhr50.r.cloudfront.net  (52.85.63.77:80)

TCP (HTTP):
Connects to server-52-85-63-5.lhr50.r.cloudfront.net  (52.85.63.5:80)

Remove bdc75287-990c-4562-9359-42a7584090a3-10.exe - Powered by Reason Core Security