codefuel.exe

Screen Saver

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application codefuel.exe by ClientConnect has been detected as adware by 3 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from fastcontent.conduit.com. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
CodeFuel  (signed by ClientConnect LTD)

Product:
Screen Saver

Version:
0.1.0.0

MD5:
2c32958ae23ff4172f3d3f8b9ea4beee

SHA-1:
1cda127ec5c26bab387f0705cbb878c301f31ac1

SHA-256:
32ac198d9e5d78266ae8303adac0e7e5922f21624fbc44dd3566f9e49d244296

Scanner detections:
3 / 68

Status:
Adware

Analysis date:
11/5/2024 2:47:31 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/ClientConnect.A potentially unwanted application
7.0.302.0

Reason Heuristics
PUP.ClientConnect.I
14.10.5.4

VIPRE Antivirus
Threat.4786236
33624

File size:
1.8 MB (1,862,104 bytes)

Copyright:
© CodeFuel

Trademarks:
Test Application is a trademark of CodeFuel

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\codefuel.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/4/2014 2:00:00 AM

Valid to:
2/6/2016 1:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=AB Test B, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
64159E29A8BF4BAC3C6280CA88B62F25

File PE Metadata
Compilation timestamp:
12/6/2009 12:50:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:tpn56gwuBxNn33oqL3dLmdEAn8gfgLnf0J:tp56gwSj3pd9AfgI

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9171

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file codefuel.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/11417389/11438512/?mainofferId=11413955&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.1.14.11437378.01&Language=US-EN

Remove codefuel.exe - Powered by Reason Core Security