Client.exe

Joltlogic

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application Client.exe by Joltlogic has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer.
Publisher:
Joltlogic  (signed and verified)

Version:
1.0.5466.20447

MD5:
de3487e8af97639462eda612f3e85311

SHA-1:
f909fb6fb8bc07e5478c18cf5731872f8b0a57d2

SHA-256:
4a2ade7c8670576da540a97e9491cedcec8e4e555c9aee60316dd57010fa20e5

Scanner detections:
5 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 6:13:46 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:IBryte-FV [PUP]
2014.9-141220

AVG
Generic
2015.0.3255

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10905

Reason Heuristics
PUP.Joltlogic.G
14.12.20.9

VIPRE Antivirus
AdKnowledge
35900

File size:
853.4 KB (873,832 bytes)

Product version:
1.0.5466.20447

Original file name:
Client.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\geniusbox\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/15/2014 8:00:00 PM

Valid to:
7/16/2015 7:59:59 PM

Subject:
CN=Joltlogic, O=Joltlogic, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
5EE011413A702F6705B25B34B674F3AB

File PE Metadata
Compilation timestamp:
12/19/2014 6:21:57 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:Cz+xYQGUprjHbwxHM+hHCrxnsXpvPMTdTF6JS+dDILHb:CzoYQGUBHbwxHMa3vPMTv6JSYIHb

Entry address:
0xD59DE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, D0, 02, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 50, 00, 00, 00, 5C, 60, 0D, 00, 74, 02, 00, 00, 00, 00, 00, 00, 74, 02...
 
[+]

Entropy:
6.3496

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
846.5 KB (866,816 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to ec2-54-221-254-214.compute-1.amazonaws.com  (54.221.254.214:80)

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to snt-re4-9d.sjc.dropbox.com  (108.160.163.112:80)

TCP (HTTP):
Connects to sjd-rc1-2a.sjc.dropbox.com  (108.160.165.173:80)

TCP (HTTP):
Connects to sjd-ra1-4e.sjc.dropbox.com  (108.160.165.33:80)

TCP (HTTP):
Connects to server-54-230-70-44.sea50.r.cloudfront.net  (54.230.70.44:80)

TCP (HTTP):
Connects to server-54-230-70-234.sea50.r.cloudfront.net  (54.230.70.234:80)

TCP (HTTP):
Connects to server-54-230-68-128.sea50.r.cloudfront.net  (54.230.68.128:80)

TCP (HTTP):
Connects to server-54-230-206-6.atl50.r.cloudfront.net  (54.230.206.6:80)

TCP (HTTP):
Connects to server-54-230-1-19.lhr5.r.cloudfront.net  (54.230.1.19:80)

TCP (HTTP):
Connects to sea15s02-in-f6.1e100.net  (216.58.216.166:80)

TCP (HTTP):
Connects to sea15s02-in-f4.1e100.net  (216.58.216.164:80)

TCP (HTTP SSL):
Connects to sea15s02-in-f14.1e100.net  (216.58.216.174:443)

TCP (HTTP):
Connects to sea15s01-in-f2.1e100.net  (216.58.216.130:80)

TCP (HTTP SSL):
Connects to sea09s18-in-f5.1e100.net  (173.194.33.165:443)

TCP (HTTP):
Connects to sea09s18-in-f28.1e100.net  (173.194.33.188:80)

TCP (HTTP):
Connects to sea09s18-in-f26.1e100.net  (173.194.33.186:80)

TCP (HTTP):
Connects to sea09s18-in-f25.1e100.net  (173.194.33.185:80)

TCP (HTTP SSL):
Connects to r4.ycpi.vip.dxs.yahoo.net  (209.191.96.199:443)

Remove Client.exe - Powered by Reason Core Security