klcp_update_1111_20150422_dlm.exe

Blueis

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application klcp_update_1111_20150422_dlm.exe by Blueis has been detected as adware by 20 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Blueis  (signed and verified)

MD5:
8269108b8cc5886145166adff7eecfb4

SHA-1:
1779514c82ef08987a5a75dab0325706e0e16ff0

SHA-256:
2aaa720ee0ae91c407ae27321ea4c155ca89cbf1cac07110b37c5a1ecb1d8765

Scanner detections:
20 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/23/2024 6:06:29 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
2015.06.17

Avira AntiVirus
TR/Crypt.XPACK.Gen
7.11.30.172

avast!
Win32:DownloadAdmin-H [PUP]
150602-1

AVG
Generic
2016.0.3076

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Downloadadmin
0.98/20568

Dr.Web
Trojan.Vittalia.74
9.0.1.05190

ESET NOD32
Win32/DownloadAdmin.I potentially unwanted application
7.0.302.0

F-Prot
W32/S-e78893a9
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy
5.14.151

G Data
Win32.Adware.DownloadAdmin
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16253

Malwarebytes
PUP.Optional.DownloadAdmin.C
v2015.06.16.02

NANO AntiVirus
Trojan.Win32.XPACK.dprfbr
0.30.24.2086

Quick Heal
PUA.Blueis.Gen
6.15.14.00

Reason Heuristics
PUP.Tightrope.Bundler
15.6.16.13

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4150696
40828

Zillya! Antivirus
Downloader.Agent.Win32.253570
2.0.0.2226

File size:
656 KB (671,696 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\klcp_update_1111_20150422_dlm.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/7/2014 1:00:00 AM

Valid to:
11/8/2015 12:59:59 AM

Subject:
CN=Blueis, O=Blueis, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
58AC2B1B2E1E80F003ECEE0F41F4124A

File PE Metadata
Compilation timestamp:
1/29/2015 7:35:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:s4BS2ly9NKPRdegPsgQr/745jezvROTVo80d1WU1ntTxJ10gJ1TvztF:shhKeiHQr/s1uRCBQWMxDpL

Entry address:
0x234A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 78, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, F8, FD, FF, FF, FF, 15, 30, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 2C, 77, 40, 00, 6A, 08, A3, 98, 3D, 42, 00, E8, DD, F9, FF, FF, 53, 68, 60, 01, 00, 00, A3, A0, 3C, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 0B, 74, 40, 00, FF, 15, 50, 71, 40, 00, 68, 00, 74, 40, 00, 68, A0, 34, 42, 00, E8, 5A, F3, FF, FF, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to st-sh-us-dc3-002.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-55-199.jfk6.r.cloudfront.net  (54.230.55.199:80)

TCP (HTTP):
Connects to server-54-192-55-38.jfk6.r.cloudfront.net  (54.192.55.38:80)

TCP (HTTP):
Connects to server-54-192-55-20.jfk6.r.cloudfront.net  (54.192.55.20:80)

TCP (HTTP):
Connects to server-54-192-55-167.jfk6.r.cloudfront.net  (54.192.55.167:80)

TCP (HTTP):
Connects to server-54-192-54-208.jfk6.r.cloudfront.net  (54.192.54.208:80)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.1.64:443)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to digital-digest.com  (67.228.82.83:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to a173-223-204-170.deploy.static.akamaitechnologies.com  (173.223.204.170:80)

TCP (HTTP):
Connects to a173-223-204-155.deploy.static.akamaitechnologies.com  (173.223.204.155:80)

TCP (HTTP):
Connects to 50.22.63.138-static.reverse.softlayer.com  (50.22.63.138:80)

TCP (HTTP):
Connects to 25.ip-167-114-153.net  (167.114.153.25:80)

Remove klcp_update_1111_20150422_dlm.exe - Powered by Reason Core Security