bitlordsetup.exe

BitLord

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application bitlordsetup.exe, “BitLord Setup ” by ClientConnect has been detected as adware by 4 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. The file has been seen being downloaded from dde.de.io-audio.com and multiple other hosts. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
Perion, Inc.   (signed by ClientConnect LTD)

Product:
BitLord

Description:
BitLord Setup

MD5:
16052eb5114757a050589db5e87c1b2a

SHA-1:
27bad02ea2593e97956e7de916f196b160263a26

SHA-256:
650450e2a1233ef1e7cc18882281516afaee99328ccee965c8fbc6351cad0317

Scanner detections:
4 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
11/24/2024 11:08:29 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.14129

ESET NOD32
Win32/ClientConnect (variant)
8.10844

Reason Heuristics
PUP.Installer.ClientConnect.M
14.12.9.11

VIPRE Antivirus
Conduit
35538

File size:
615.4 KB (630,120 bytes)

Product version:
1.5.0.3

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\bitlordsetup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/4/2014 2:00:00 AM

Valid to:
2/6/2016 1:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Prod2, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
7D43A9D40B810B6AC20F2CDF15B5CCF6

File PE Metadata
Compilation timestamp:
7/9/2014 9:58:13 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:JSxG0S888888888888W88888888888/q8AHNl1yRdzIefjsDdcGw6Fxi7KqumOzy:ExGZq8Ul1ITQxcGwb72Py

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.7814

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file bitlordsetup.exe has been seen being distributed by the following 3 URLs.

http://127.0.0.1:37848/continue?TiCredToken=19228&Source=WTP&URL=http://dde.de.io-audio.com/55/125/ct1255455/cf28cb1d0ffc4c37b604058659b1b0b5/Downloads/Prod/DDE1.4.0.1.140930.02/.../BitLordSetup.exe

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/14737240/14758363/?mainofferId=14733806&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.4.47.14757229.01&Language=US-EN

Remove bitlordsetup.exe - Powered by Reason Core Security