dcytdkietut_tutdk_setup.exe

Goobzo Ltd

The application dcytdkietut_tutdk_setup.exe by Goobzo has been detected as adware by 16 anti-malware scanners. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address server-205-251-251-195.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Goobzo Ltd  (signed and verified)

Version:
2.9.0.999

MD5:
5f581264b8ebc8242df7f1d1ef0f3856

SHA-1:
ff2573f9b945a869e51316c0522d34dce2d6b1a6

SHA-256:
e73f745e8e15bd741a03a4a26bc6ac798984127b404939c0521e3fda9ac42daa

Scanner detections:
16 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
12/25/2024 12:49:05 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.171097
568

AhnLab V3 Security
PUP/Win32.CrossRider
2015.07.17

Avira AntiVirus
ADWARE/CrossRider.Gen
8.3.1.6

Arcabit
Trojan.Adware.Graftor.D29C59
1.0.0.425

avast!
Win32:GenMaliciousA-IJF [PUP]
2014.9-150717

AVG
Generic
2016.0.3046

Bitdefender
Gen:Variant.Adware.Graftor.171097
1.0.20.990

Dr.Web
Adware.Searcher.2797
9.0.1.0198

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.171097
8.15.07.17.04

ESET NOD32
Win32/SpeedBit.C potentially unwanted (variant)
9.11952

F-Secure
Gen:Variant.Adware.Graftor
11.2015-17-07_6

G Data
Gen:Variant.Adware.Graftor.171097
15.7.25

Malwarebytes
PUP.Optional.SpeedBit
v2015.07.17.04

MicroWorld eScan
Gen:Variant.Adware.Graftor.171097
16.0.0.594

Panda Antivirus
Adware/Goobzo
15.07.17.04

Reason Heuristics
PUP.Goobzo.Installer (M)
15.7.17.4

File size:
1.2 MB (1,236,456 bytes)

Product version:
2.9.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\dcytdkietut_tutdk_setup.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
2/3/2015 4:00:00 PM

Valid to:
5/5/2016 4:59:59 PM

Subject:
CN=Goobzo Ltd, O=Goobzo Ltd, L=Haifa, S=HAIFA, C=IL

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
3C3E526E4FC7FCA9432F2BC6F34C86A5

File PE Metadata
Compilation timestamp:
7/16/2015 12:05:07 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:s4GC1x1YYJJ53nv6OxfnKvwbd9RufvofiysApT53PHJjTtLXPm99bIc:dF1YYJJ53nyuiorEfvofiysAD/pPtLXG

Entry address:
0x60718

Entry point:
E8, DD, E0, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, B8, 7B, 4E, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 80, 47, 4E, 00, 01, 0F, 82, 0E, E2, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0...
 
[+]

Entropy:
6.6320

Code size:
667 KB (683,008 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-205-251-251-72.jfk5.r.cloudfront.net  (205.251.251.72:80)

TCP (HTTP):
Connects to server-205-251-251-195.jfk5.r.cloudfront.net  (205.251.251.195:80)

TCP (HTTP):
Connects to server-205-251-251-125.jfk5.r.cloudfront.net  (205.251.251.125:80)

Remove dcytdkietut_tutdk_setup.exe - Powered by Reason Core Security