cloud.exe

Cloud

GOLD CLICK LIMITED

The executable cloud.exe, “PG Network Component” has been detected as malware by 1 anti-virus scanner. While running, it connects to the Internet address 206.190.151.118.static.midphase.com on port 443.
Publisher:
Gold Click Ltd  (signed by GOLD CLICK LIMITED)

Product:
Cloud

Description:
PG Network Component

Version:
3.0.1.42

MD5:
7a67aeb4c77d30787b3bac516a81f2b1

SHA-1:
42495ffb998b95ae34def50368cde9ab1a374682

SHA-256:
98407b1e2dc4a0899bcf939e0acbb0decf09fc40d39534b43acbf285e6cc02e1

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
11/22/2024 8:00:33 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.8.22.16

File size:
1.4 MB (1,503,328 bytes)

Product version:
3.0.1.42

Copyright:
Gold Click Ltd

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\proxygate\cloud.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
1/5/2016 5:21:09 PM

Valid to:
4/26/2017 11:17:01 PM

Subject:
CN=GOLD CLICK LIMITED, O=GOLD CLICK LIMITED, S=Surrey, C=GB

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121E1CE57747D3AA0E2D8A055EE1FA5696D

File PE Metadata
OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
3.0

CTPH (ssdeep):
24576:UBgjyhGqLOqvE2XPqVjrP6T5pqhejngNUS5zDhHUeeGFYrEofVhvPCdKfqA87:UBKYLRjPqhrKgqnjShNzRYrEuDva37

Entry address:
0x5D2610

Entry point:
60, BE, 15, 60, 86, 00, 8D, BE, EB, AF, B9, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, B2, 04, 5D, 00, 57, 83, C3, 04, 53, 68, ED, C5, 16, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.9996  (probably packed)

Code size:
1.4 MB (1,499,136 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to 206.190.151.118.static.midphase.com  (206.190.151.118:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP SSL):
Connects to a23-2-236-181.deploy.static.akamaitechnologies.com  (23.2.236.181:443)

TCP (HTTP):
Connects to a23-194-81-114.deploy.static.akamaitechnologies.com  (23.194.81.114:80)

TCP (HTTP):
Connects to s-prd-req-adcom-scd-blue-b.evip.aol.com  (149.174.66.133:80)

TCP (HTTP):
Connects to ec2-35-165-19-145.us-west-2.compute.amazonaws.com  (35.165.19.145:80)

TCP (HTTP):

TCP (HTTP SSL):
Connects to a23-202-232-245.deploy.static.akamaitechnologies.com  (23.202.232.245:443)

TCP (HTTP):
Connects to a23-202-217-164.deploy.static.akamaitechnologies.com  (23.202.217.164:80)

TCP (HTTP SSL):
Connects to a23-196-237-123.deploy.static.akamaitechnologies.com  (23.196.237.123:443)

Remove cloud.exe - Powered by Reason Core Security