client.exe

Software Jockey

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application client.exe by Software Jockey has been detected as adware by 8 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 49509 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
Publisher:
Software Jockey  (signed and verified)

MD5:
4478c34c73250d7d915ace9a387a1056

SHA-1:
f132c78d80670f91cdaa07a2a3390c6ca5d3f571

SHA-256:
c287a18723f64096d67f6c84f81d44fe6977a65fbbd78597b35c12500859c9bd

Scanner detections:
8 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Analysis date:
12/25/2024 3:59:50 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3253

Baidu Antivirus
Adware.Win32.RocketTab
4.0.3.141222

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10701

Kaspersky
not-a-virus:AdWare.MSIL.RocketTab
14.0.0.2760

Malwarebytes
PUP.Optional.SoftJok
v2014.12.22.12

McAfee
Artemis!9CBD7602DB05
5600.6909

Reason Heuristics
PUP.SoftwareJockey.G
14.11.4.14

VIPRE Antivirus
AdKnowledge
34504

File size:
5.5 MB (5,751,528 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\search extensions\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 8:00:00 PM

Valid to:
3/24/2015 7:59:59 PM

Subject:
CN=Software Jockey, O=Software Jockey, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3481FC293A085AD3BA94D30DC9CC2E95

File PE Metadata
Compilation timestamp:
11/4/2014 9:29:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:Obwlmj5vfO7ujxmEDBYpDHOtjzbWHrKACC+BH0nvlnMUwzoetS3Ubwu75Pu4qppP:bM7GP07XLFCnFIhe7B5/zvWwek

Entry address:
0x1D9D

Entry point:
E8, 7D, 26, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, AC, 8F, 97, 00, FF, 15, 38, 80, 40, 00, 85, C0, 75, 18, 56, E8, 2F, 27, 00, 00, 8B, F0, FF, 15, 34, 80, 40, 00, 50, E8, DF, 26, 00, 00, 59, 89, 06, 5E, 5D, C3, 6A, 0C, 68, 90, A4, 40, 00, E8, 43, 24, 00, 00, 6A, 0E, E8, 2F, 2A, 00, 00, 59, 83, 65, FC, 00, 8B, 75, 08, 8B, 4E, 04, 85, C9, 74, 2F, A1, 00, 84, 97, 00, BA, FC, 83, 97, 00, 89, 45, E4, 85, C0, 74, 11, 39, 08, 75, 2C, 8B, 48, 04, 89, 4A...
 
[+]

Entropy:
4.6898

Code size:
25.5 KB (26,112 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49509/

Local host port:
49509

Default credentials:
No


The file client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to pf.benjaminstrahs.com  (149.56.157.112:80)

TCP (HTTP SSL):
Connects to static.144.20.251.148.clients.your-server.de  (148.251.20.144:443)

TCP (HTTP SSL):
Connects to ec2-107-20-234-63.compute-1.amazonaws.com  (107.20.234.63:443)

TCP (HTTP SSL):
Connects to a23-57-212-41.deploy.static.akamaitechnologies.com  (23.57.212.41:443)

TCP (HTTP):
Connects to ec2-23-21-48-109.compute-1.amazonaws.com  (23.21.48.109:80)

TCP (HTTP):
Connects to yts1.yql.vip.bf1.yahoo.com  (98.137.200.255:80)

TCP (HTTP SSL):
Connects to vip1.g.cachefly.net  (205.234.175.175:443)

TCP (HTTP):
Connects to ec2-54-243-239-5.compute-1.amazonaws.com  (54.243.239.5:80)

TCP (HTTP):
Connects to ec2-54-243-215-84.compute-1.amazonaws.com  (54.243.215.84:80)

TCP (HTTP):
Connects to ec2-54-243-173-217.compute-1.amazonaws.com  (54.243.173.217:80)

TCP (HTTP):
Connects to ec2-54-243-168-250.compute-1.amazonaws.com  (54.243.168.250:80)

TCP (HTTP):
Connects to ec2-54-221-221-233.compute-1.amazonaws.com  (54.221.221.233:80)

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to ec2-54-204-8-133.compute-1.amazonaws.com  (54.204.8.133:80)

TCP (HTTP):
Connects to ec2-174-129-39-228.compute-1.amazonaws.com  (174.129.39.228:80)

TCP (HTTP):
Connects to ec2-174-129-225-161.compute-1.amazonaws.com  (174.129.225.161:80)

TCP (HTTP):
Connects to ec2-107-21-205-251.compute-1.amazonaws.com  (107.21.205.251:80)

TCP (HTTP):
Connects to ec2-107-20-238-71.compute-1.amazonaws.com  (107.20.238.71:80)

TCP (HTTP):
Connects to ec2-107-20-207-182.compute-1.amazonaws.com  (107.20.207.182:80)

TCP (HTTP SSL):
Connects to e5.13.de.static.xlhost.com  (206.222.19.229:443)

Remove client.exe - Powered by Reason Core Security