client.exe

Joltlogic

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application client.exe by Joltlogic has been detected as adware by 7 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 49163 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host.
Publisher:
Joltlogic  (signed and verified)

MD5:
9c7ea571a48d2791c314ea2d847897a5

SHA-1:
39ff823a49135168181bf86f63f15079f020abe0

SHA-256:
f623823c68a760ff6305736802872f8303ae8783c3c60f407d89bc5223b2ed1d

Scanner detections:
7 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Analysis date:
11/15/2024 6:34:32 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.iBryte.539
9.0.1.0332

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10798

McAfee
Artemis!9C7EA571A48D
5600.6932

Panda Antivirus
Trj/Genetic.gen
14.11.28.09

Reason Heuristics
PUP.Joltlogic.G
14.11.28.21

Trend Micro House Call
Suspicious_GEN.F47V1127
7.2.332

VIPRE Antivirus
AdKnowledge
35230

File size:
3.4 MB (3,538,656 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\geniusbox\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/15/2014 8:00:00 PM

Valid to:
7/16/2015 7:59:59 PM

Subject:
CN=Joltlogic, O=Joltlogic, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
5EE011413A702F6705B25B34B674F3AB

File PE Metadata
Compilation timestamp:
11/25/2014 3:07:35 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:6qbS+wiegWR0D8twBA0Pqeb+HGwNPxm1rHKBQm/1upubkT:6qbS1Oob

Entry address:
0x1D53

Entry point:
E8, 77, 26, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, DF, 75, 00, FF, 15, 38, 80, 40, 00, 85, C0, 75, 18, 56, E8, 29, 27, 00, 00, 8B, F0, FF, 15, 34, 80, 40, 00, 50, E8, D9, 26, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, 50, A4, 40, 00, E8, 3D, 24, 00, 00, 6A, 0E, E8, 29, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, D4, 75, 00, BA, FC, D3, 75, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.1686

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49163/

Local host port:
49163

Default credentials:
No


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to https-208-111-178-93.dal.llnw.net  (208.111.178.93:443)

TCP (HTTP SSL):
Connects to vip1.g5.cachefly.net  (205.234.175.175:443)

TCP (HTTP SSL):
Connects to e4-ha.ycpi.dnb.yahoo.com  (69.147.70.150:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.gq1.yahoo.com  (208.71.45.11:443)

TCP (HTTP):
Connects to ec2-50-17-224-168.compute-1.amazonaws.com  (50.17.224.168:80)

TCP (HTTP SSL):
Connects to a96-7-41-160.deploy.akamaitechnologies.com  (96.7.41.160:443)

TCP (HTTP SSL):
Connects to a23-48-156-208.deploy.static.akamaitechnologies.com  (23.48.156.208:443)

TCP (HTTP):

TCP (HTTP):
Connects to server-52-85-113-149.ind6.r.cloudfront.net  (52.85.113.149:80)

TCP (HTTP):
Connects to ec2-54-83-201-51.compute-1.amazonaws.com  (54.83.201.51:80)

TCP (HTTP):
Connects to ec2-54-235-170-110.compute-1.amazonaws.com  (54.235.170.110:80)

TCP (HTTP):
Connects to ec2-54-225-162-60.compute-1.amazonaws.com  (54.225.162.60:80)

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP SSL):
Connects to ec2-52-73-109-231.compute-1.amazonaws.com  (52.73.109.231:443)

TCP (HTTP):
Connects to ec2-23-23-122-91.compute-1.amazonaws.com  (23.23.122.91:80)

TCP (HTTP SSL):
Connects to cloud.gti.mcafee.com  (161.69.92.6:443)

TCP (HTTP):

TCP (HTTP SSL):
Connects to a104-86-98-31.deploy.static.akamaitechnologies.com  (104.86.98.31:443)

TCP (HTTP SSL):
Connects to a-0001.a-msedge.net  (204.79.197.200:443)

TCP (HTTP SSL):
Connects to yk-in-f100.1e100.net  (74.125.196.100:443)

Remove client.exe - Powered by Reason Core Security