browsers apps-codedownloader.exe

Browsers Apps

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application browsers apps-codedownloader.exe, “Browsers Apps exe” by Sailor Project has been detected as adware by 40 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for browser extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
browser  (signed by Sailor Project)

Product:
Browsers Apps

Description:
Browsers Apps exe

Version:
1000.1000.1000.1000

MD5:
daa65dc964987842702e504fc8cc5305

SHA-1:
c2d98916058a974ebc51d092648f83f9ad5af90f

SHA-256:
1bc7b986d094a004733be501346dae2052e55f08d2644f5d9741918fe072776f

Scanner detections:
40 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Sailor Project.

Analysis date:
12/26/2024 12:01:06 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
844

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

AhnLab V3 Security
PUP/Win32.PlusHD
2014.06.18

Avira AntiVirus
Adware/CrossRider.AC
7.11.148.112

avast!
Win32:Malware-gen
2014.9-140810

AVG
MalSign.Skodna
2015.0.3386

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14810

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1435

Bkav FE
W32.Sality.PE
1.3.0.4959

Comodo Security
ApplicUnwnt
18241

Dr.Web
Trojan.Crossrider.27936
9.0.1.0287

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.10.14.02

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Riskware/Toolbar_CrossRider
10/14/2014

F-Prot
W32/Sality.gen2
v6.4.6.5.141

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-14-10_3

G Data
Gen:Variant.Adware.Kazy.374109
14.10.24

IKARUS anti.virus
AdWare.CrossRider
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12026

Kaspersky
Virus.Win32.Sality
14.0.0.3104

Malwarebytes
PUP.Optional.ObjectBrowser.A
v2014.08.10.05

McAfee
Trojan.Artemis!A38A6376EE09
5600.7042

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.861

NANO AntiVirus
Riskware.Win32.AdLoad.dbiihv
0.28.0.60253

Norman
Sality.ZHB
11.20141014

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
PUP/PlusHD
14.10.14.02

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Quick Heal
W32.Sality.U
10.14.14.00

Reason Heuristics
PUP.Crossrider.SailorProject.CC
14.8.10.14

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.141012

Sophos
AppRider
4.98

Total Defense
Win32/Sality.AA
37.0.11045

Trend Micro House Call
TROJ_GEN.F47V0507
7.2.287

Trend Micro
PE_SALITY.RL
10.465.14

Vba32 AntiVirus
Virus.Win32.Sality.bakb
3.12.26.3

VIPRE Antivirus
Crossrider
28992

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1850

File size:
563.4 KB (576,872 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Browsers Apps.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\browsers apps\browsers apps-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 2:00:00 AM

Valid to:
7/19/2015 1:59:59 AM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
8/10/2014 12:07:47 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:4eMLsewPcWJK4ykyCH3I5hu7UzGupT/xx:4eDPcM/dHbWGiTpx

Entry address:
0x48AAA

Entry point:
E8, 79, DE, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1...
 
[+]

Entropy:
6.4334

Code size:
445 KB (455,680 bytes)

Scheduled Task
Task name:
d3342fd0-bb6b-4587-b17c-35bc9f1c4eac-1

Path:
C:\WINDOWS\Tasks\d3342fd0-bb6b-4587-b17c-35bc9f1c4eac-1.job

Trigger:
Logon (Runs on logon)

Action:
browsers apps-codedownloader.exe \bukys \wowislbg=task \mqobbdfq='browsers apps' \h


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/007916/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove browsers apps-codedownloader.exe - Powered by Reason Core Security