firefox_tsa14jyc4.exe

Perion Network Ltd.

The application firefox_tsa14jyc4.exe by Perion Network has been detected as a potentially unwanted program by 10 anti-malware scanners. The program is a setup application that uses the Perion Download Manager installer. With this installer, users are expecting to download the free Mozilla Firefox web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware. The file has been seen being downloaded from dm.dmccint.com and multiple other hosts. While running, it connects to the Internet address ude.databssint.com on port 80 using the HTTP protocol.
Publisher:
Perion Network Ltd.  (signed and verified)

MD5:
a67d7b29c4162d4f3dc57b3ccf9777ad

SHA-1:
8ee1065c7ad45582fa1649d58b3f9ff82fb67e6f

SHA-256:
3f3a0562c3d08d24295144d53d65d8de49f4802f6b4204051ee2c4c1c1d3cdbc

Scanner detections:
10 / 68

Status:
Potentially unwanted

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 2:13:51 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
PUA.Win32.Perinet
4.0.3.14125

Dr.Web
Adware.Downware.1895
9.0.1.0339

ESET NOD32
Win32/Toolbar.Conduit.AE
8.10689

Fortinet FortiGate
Riskware/Toolbar_Conduit
12/5/2014

G Data
Win32.Application.Conduit
14.12.24

K7 AntiVirus
Unwanted-Program
13.185.13943

Kaspersky
not-a-virus:WebToolbar.Win32.Perinet
14.0.0.2843

Malwarebytes
PUP.Optional.ClientConnect
v2014.12.05.10

Reason Heuristics
PUP.Perion.R
14.12.5.10

VIPRE Antivirus
Conduit
34604

File size:
641.9 KB (657,352 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Perion Download Manager (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\firefox_tsa14jyc4.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/23/2012 5:00:00 PM

Valid to:
4/23/2015 4:59:59 PM

Subject:
CN=Perion Network Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Perion Network Ltd., L=Tel Aviv, S=Tel Aviv, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45F87694FE8D1984719796AEC8031DF4

File PE Metadata
Compilation timestamp:
2/24/2012 11:19:59 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:vEUt0HKS/0RxKlsAMpY8gCaEgWOGrhYU0ZEUUhSiiA2jeCwL:vLHScfKtdCaEgMiU0doLKTm

Entry address:
0x39E3

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 91, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, C0, 82, 40, 00, 6A, 08, A3, B8, 2E, 47, 00, E8, 37, 2A, 00, 00, 55, 68, B4, 02, 00, 00, A3, D0, 2D, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 93, 40, 00, FF, 15, 84, 81, 40, 00, 68, 04, 93, 40, 00, 68, C0, AD, 46, 00, E8, 19, 27, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 30, 4C, 00, 57, E8, 07, 27, 00, 00...
 
[+]

Entropy:
7.9620

Packer / compiler:
Nullsoft install system v2.x

Code size:
28 KB (28,672 bytes)

The file firefox_tsa14jyc4.exe has been seen being distributed by the following 4 URLs.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ude.databssint.com  (107.22.223.150:80)

TCP (HTTP):
Connects to storage.stgbssint.com  (172.229.236.170:80)

Remove firefox_tsa14jyc4.exe - Powered by Reason Core Security