ed9256a4.exe

SwiftSearch

The application ed9256a4.exe by SwiftSearch has been detected as a potentially unwanted program by 18 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from 201.31.162.87 and multiple other hosts.
Publisher:
SS  (signed by SwiftSearch)

Product:
SS

Description:
SS Setup

Version:
1.10.0.25

MD5:
eed685d7784468ac0f880f802d42701b

SHA-1:
cb7ee27e4b81ecb2117f6ea8d8f531da0a6161e8

SHA-256:
ab4d5721cfadd098c60361cd4897a084538a2c2705e6b57f7409527d3c35f8ab

Scanner detections:
18 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 6:12:28 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Vitruvian.1
5692447

Agnitum Outpost
Riskware.Agent
7.1.1

Arcabit
Trojan.Adware.Vitruvian.1
1.0.0.567

avast!
Adware-CZP [Adw]
151024-0

Bitdefender
Gen:Variant.Adware.Vitruvian.1
1.0.20.1340

Dr.Web
Adware.Plugin.1201
9.0.1.05190

Emsisoft Anti-Malware
Adware.Vitruvian.R
10.0.0.5366

ESET NOD32
multiple threats
7.0.302.0

Fortinet FortiGate
Adware/Vitruvian
9/25/2015

F-Secure
Gen:Variant.Adware.Vitruvian
11.2015-25-09_6

G Data
Gen:Variant.Adware.Vitruvian
15.9.25

Kaspersky
not-a-virus:AdWare.Win32.Vitruvian
15.0.0.562

Malwarebytes
PUP.Optional.SwiftSearch
v2015.09.25.06

MicroWorld eScan
Gen:Variant.Adware.Vitruvian.1
16.0.0.804

Norman
Adware.Vitruvian.R
07.10.2015 03:16:12

Qihoo 360 Security
HEUR/QVM42.1.Malware.Gen
1.0.0.1015

Sophos
Generic PUA EO (PUA)
4.98

VIPRE Antivirus
Threat.5063666
45208

File size:
1.1 MB (1,188,472 bytes)

Product version:
1.10.0.25

Copyright:
(c) 2015 SS

Original file name:
swse-setup.exe

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\ed9256a4.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
2/23/2015 7:45:07 PM

Valid to:
2/23/2017 7:45:07 PM

Subject:
E=support@swiftsearchapp.com, CN=SwiftSearch, O=SwiftSearch, L=San Diego, S=CA, C=US

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11212243360BF81E92B757E53EF472D24198

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:06 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:7h09wOHfm3qaBX79DVu3B6VQgo6tVm3OsteAPOxF:kwOHMqa579DVu3MaB6tViOsttPUF

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 6F, 44, 00, E8, 09, 2C, 00, 00, A3, A4, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 2E, 44, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file ed9256a4.exe has been seen being distributed by the following 5 URLs.

http://201.31.162.87/cache/d19qkwe20t8d3h.cloudfront.net/.../swse-setup-1.10.0.25.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ec2-54-210-179-159.compute-1.amazonaws.com  (54.210.179.159:443)

TCP (HTTP SSL):
Connects to ec2-54-209-124-251.compute-1.amazonaws.com  (54.209.124.251:443)

TCP (HTTP SSL):
Connects to ec2-54-175-213-223.compute-1.amazonaws.com  (54.175.213.223:443)

TCP (HTTP SSL):
Connects to ec2-54-174-193-154.compute-1.amazonaws.com  (54.174.193.154:443)

TCP (HTTP SSL):
Connects to ec2-54-165-29-218.compute-1.amazonaws.com  (54.165.29.218:443)

TCP (HTTP SSL):
Connects to ec2-54-165-214-194.compute-1.amazonaws.com  (54.165.214.194:443)

TCP (HTTP SSL):
Connects to ec2-54-164-214-62.compute-1.amazonaws.com  (54.164.214.62:443)

TCP (HTTP SSL):
Connects to ec2-54-164-103-109.compute-1.amazonaws.com  (54.164.103.109:443)

TCP (HTTP SSL):
Connects to ec2-54-152-108-175.compute-1.amazonaws.com  (54.152.108.175:443)

TCP (HTTP SSL):
Connects to ec2-52-6-169-224.compute-1.amazonaws.com  (52.6.169.224:443)

TCP (HTTP SSL):
Connects to ec2-52-6-160-173.compute-1.amazonaws.com  (52.6.160.173:443)

TCP (HTTP SSL):
Connects to ec2-52-5-176-108.compute-1.amazonaws.com  (52.5.176.108:443)

TCP (HTTP SSL):
Connects to ec2-52-4-85-129.compute-1.amazonaws.com  (52.4.85.129:443)

TCP (HTTP SSL):
Connects to ec2-52-4-123-185.compute-1.amazonaws.com  (52.4.123.185:443)

TCP (HTTP SSL):
Connects to ec2-52-3-204-169.compute-1.amazonaws.com  (52.3.204.169:443)

TCP (HTTP SSL):
Connects to ec2-52-3-159-103.compute-1.amazonaws.com  (52.3.159.103:443)

TCP (HTTP SSL):
Connects to ec2-52-2-95-90.compute-1.amazonaws.com  (52.2.95.90:443)

TCP (HTTP SSL):
Connects to ec2-52-22-239-18.compute-1.amazonaws.com  (52.22.239.18:443)

TCP (HTTP SSL):
Connects to ec2-52-22-211-169.compute-1.amazonaws.com  (52.22.211.169:443)

TCP (HTTP SSL):
Connects to ec2-52-20-130-15.compute-1.amazonaws.com  (52.20.130.15:443)

Remove ed9256a4.exe - Powered by Reason Core Security