garrys mod.exe

Blueis

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application garrys mod.exe by Blueis has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. According to AVG, this software downloads additional adware offers during setup. While running, it connects to the Internet address a1plpkivs-v03.any.prod.ash1.secureserver.net on port 80 using the HTTP protocol.
Publisher:
Blueis  (signed and verified)

MD5:
4d64da97a9cc990d26691e55dbacf43a

SHA-1:
1647a731fa9e795b2276ed7ee5d0e98eb038e3d6

SHA-256:
5b725d9ce0ac18561bb0a7ba64cbd399ba595d7ebbbc599867ff92739c01b34d

Scanner detections:
29 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/24/2024 5:05:59 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Application.Bundler.DownloadAdmin.A
5762964

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2015.06.17

Avira AntiVirus
PUA/DownloadAdmin.P
8.3.1.6

Arcabit
Application.Bundler.DownloadAdmin.A
1.0.0.425

avast!
Win32:DownloadAdmin-H [PUP]
150602-1

AVG
Downloader
2016.0.3076

Bitdefender
Dropped:Application.Bundler.DownloadAdmin.A
1.0.20.840

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Downloadadmin
0.98/20573

Comodo Security
Application.Win32.DownloadAdmin.DAGL
22473

Dr.Web
Trojan.Vittalia.74
9.0.1.05190

Emsisoft Anti-Malware
Dropped:Application.Bundler.DownloadAdmin
10.0.0.5366

ESET NOD32
Win32/DownloadAdmin.I potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.6247
6/17/2015

F-Prot
W32/S-e78893a9
v6.4.7.1.166

F-Secure
Adware:W32/WebInstallBundle
5.14.151

G Data
Dropped:Application.Bundler.DownloadAdmin
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16253

Malwarebytes
PUP.Optional.DownloadAdmin.C
v2015.06.17.02

MicroWorld eScan
Dropped:Application.Bundler.DownloadAdmin.A
16.0.0.504

NANO AntiVirus
Trojan.Win32.XPACK.dprfbr
0.30.24.2086

Norman
Dropped:Application.Bundler.DownloadAdmin.A
02.06.2015 14:23:46

Quick Heal
PUA.Blueis.Gen
6.15.14.00

Reason Heuristics
PUP.Tightrope.Bundler
15.6.16.22

Total Defense
Win32/Tnega.TNECKHC
37.1.62.1

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4150696
40786

Zillya! Antivirus
Downloader.Agent.Win32.239245
2.0.0.2229

File size:
651.3 KB (666,936 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\garrys mod.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/6/2014 6:00:00 PM

Valid to:
11/7/2015 5:59:59 PM

Subject:
CN=Blueis, O=Blueis, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
58AC2B1B2E1E80F003ECEE0F41F4124A

File PE Metadata
Compilation timestamp:
1/29/2015 12:35:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:nKCFG+pl1Hp7p4ZkuRt4Zh3UdOxouSdWE7uglrB/jmN7Trkfcn+zx:n3Xxp4Zkuf47kdtdZ7uC/jmlrDn+zx

Entry address:
0x234A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 78, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, F8, FD, FF, FF, FF, 15, 30, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 2C, 77, 40, 00, 6A, 08, A3, 98, 3D, 42, 00, E8, DD, F9, FF, FF, 53, 68, 60, 01, 00, 00, A3, A0, 3C, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 0B, 74, 40, 00, FF, 15, 50, 71, 40, 00, 68, 00, 74, 40, 00, 68, A0, 34, 42, 00, E8, 5A, F3, FF, FF, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57...
 
[+]

Entropy:
7.9728

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to st-sh-us-dc1-002.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-53-81.jfk6.r.cloudfront.net  (54.230.53.81:80)

TCP (HTTP):
Connects to server-54-230-52-91.jfk6.r.cloudfront.net  (54.230.52.91:80)

TCP (HTTP):
Connects to server-54-230-52-231.jfk6.r.cloudfront.net  (54.230.52.231:80)

TCP (HTTP):
Connects to server-54-192-54-73.jfk6.r.cloudfront.net  (54.192.54.73:80)

TCP (HTTP):
Connects to server-54-192-54-173.jfk6.r.cloudfront.net  (54.192.54.173:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to a72-246-43-10.deploy.akamaitechnologies.com  (72.246.43.10:80)

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to a173-223-205-51.deploy.static.akamaitechnologies.com  (173.223.205.51:80)

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)

Remove garrys mod.exe - Powered by Reason Core Security