dailybee.exe

DailyWiki

The executable dailybee.exe has been detected as malware by 1 anti-virus scanner. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyBee’. This file is typically installed with the program DailyBee - DailyBee for Desktop by DailyBee.
Publisher:
DailyWiki  (signed and verified)

MD5:
55da513be28d6a743c3b23d1a2d21fd8

SHA-1:
6cce782b3df63813c8d0236ad3b314a95c969668

SHA-256:
f2050ec39222ba5b0060dc7e45d785703248e449e79f096f6df63da90bfe08b9

Scanner detections:
1 / 68

Status:
Malware

Analysis date:
12/23/2024 4:21:42 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.8.31.17

File size:
45.6 MB (47,813,400 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailybee\dailybee.exe

Digital Signature
Signed by:

Authority:
DailyWiki

Valid from:
9/19/2015 12:16:51 PM

Valid to:
9/16/2025 12:16:51 PM

Subject:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Issuer:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Serial number:
00DE81C7E6A224F568

File PE Metadata
Compilation timestamp:
2/20/2016 4:43:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
786432:vuK9C64r1c7VQZgnUrurLpbH05yL5dsuUQq6+4UYOkdOXQO2tf:mwC64r1c6ZgnUSrLpbUAdBUQq6/BLqyf

Entry address:
0x1C9A031

Entry point:
E8, 5A, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, A8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, A8, EC, 02, 5D, C3, E8, 09, 21, 00, 00, 85, C0, 74, 08, 6A, 16, E8, CC, 21, 00, 00, 59, F6, 05, 20, A8, EC, 02, 02, 74, 21, 6A, 17, E8, D9, 20, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A9, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 16, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Code size:
34.9 MB (36,634,112 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyBee

Command:
C:\users\{user}\appdata\roaming\dailybee\dailybee.exe su


The file dailybee.exe has been discovered within the following program.

About 2% of users remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to dmppixel-shared-mtc-c.evip.aol.com  (64.12.245.38:443)

TCP (HTTP SSL):
Connects to s-prd-umpxl-adcom-scd-a.evip.aol.com  (152.163.13.4:443)

TCP (HTTP SSL):
Connects to unknown.telstraglobal.net  (210.176.156.25:443)

TCP (HTTP SSL):
Connects to bam-7.nr-data.net  (162.247.242.19:443)

TCP (HTTP SSL):
Connects to *.d1.sc.omtrdc.net  (66.235.148.128:443)

TCP (HTTP SSL):
Connects to a104-122-127-145.deploy.static.akamaitechnologies.com  (104.122.127.145:443)

TCP (HTTP SSL):
Connects to a104-122-119-19.deploy.static.akamaitechnologies.com  (104.122.119.19:443)

TCP (HTTP SSL):
Connects to a104-122-105-242.deploy.static.akamaitechnologies.com  (104.122.105.242:443)

TCP (HTTP SSL):
Connects to text-lb.esams.wikimedia.org  (91.198.174.192:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.sg3.yahoo.com  (106.10.162.43:443)

TCP (HTTP SSL):
Connects to l1.ycs.vip.inc.yahoo.com  (203.84.220.80:443)

TCP (HTTP):
Connects to euve246913.serverprofi24.com  (62.75.142.165:80)

TCP (HTTP):
Connects to a88-221-116-248.deploy.akamaitechnologies.com  (88.221.116.248:80)

TCP (HTTP SSL):
Connects to a104-98-171-135.deploy.static.akamaitechnologies.com  (104.98.171.135:443)

TCP (HTTP SSL):
Connects to a104-106-226-54.deploy.static.akamaitechnologies.com  (104.106.226.54:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.bf1.yahoo.com  (63.250.200.63:443)

TCP (HTTP SSL):
Connects to a23-57-249-169.deploy.static.akamaitechnologies.com  (23.57.249.169:443)

Remove dailybee.exe - Powered by Reason Core Security