lollipop_08291523.exe

Lollipop

Lollipop Network, S.L.

The application lollipop_08291523.exe by Lollipop Network, S.L has been detected as adware by 14 anti-malware scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘lollipop_08291523’. While running, it connects to the Internet address l1-ha.ycs.mxa.yahoo.com on port 443.
Publisher:
Lollipop Network, S.L.  (signed and verified)

Product:
Lollipop

Version:
1, 0, 0, 1

MD5:
96186821a47398dd0f62a969d1768886

SHA-1:
fe538f849857acf78e9b0384c340151f46ad51eb

SHA-256:
1ed1ac59d3b0f1905cdc4319f6f7dadbe3910b02299b0b5cd488706083f64e52

Scanner detections:
14 / 68

Status:
Adware

Analysis date:
11/8/2024 6:04:16 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/Lollipop.A.4335
7.11.152.248

AVG
Generic5
2015.0.3355

Comodo Security
ApplicUnwnt
18432

Dr.Web
Trojan.Wintrim.1661
9.0.1.0253

ESET NOD32
Win32/Kryptik.BYXJ (variant)
8.9892

Fortinet FortiGate
W32/Kryptik.BYXJ!tr
9/10/2014

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Lollipop
14.0.0.3272

McAfee
Artemis!96186821A473
5600.7011

NANO AntiVirus
Riskware.Win32.Wintrim.cwxtfd
0.28.0.60100

Qihoo 360 Security
Win32/Virus.Adware.e72
1.0.0.1015

Reason Heuristics
PUP.LollipopNetworkSL.R
14.9.10.15

Sophos
Generic PUA PO
4.98

Trend Micro House Call
TROJ_GEN.F47V0506
7.2.253

VIPRE Antivirus
Lollipop
29930

File size:
1.4 MB (1,433,632 bytes)

Product version:
1, 0, 0, 1

Copyright:
Copyright (C) 2012

Original file name:
Lollipop

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\lollipop\lollipop_08291523.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
6/18/2013 2:00:00 AM

Valid to:
8/7/2014 1:59:59 AM

Subject:
CN="Lollipop Network, S.L.", OU=ESB-65825150, O="Lollipop Network, S.L.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
540CCDE0AE3A0396B1DE70A34AB930AF

File PE Metadata
Compilation timestamp:
5/6/2014 5:06:06 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:iz5fF4c3hFk0/9b2Cj5/x4pMZxkbm/Uca4LVtCokmU2PCriKTRPGWC:iNvkWduUlXCoVVCZtO

Entry address:
0x6BCD

Entry point:
E8, 93, 86, 00, 00, E9, 78, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3...
 
[+]

Code size:
140 KB (143,360 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
lollipop_08291523

Command:
"C:\users\{user}\appdata\local\lollipop\lollipop_08291523.exe" lollipop_08291523


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to bebekoyunu.com.tr  (5.135.108.136:80)

TCP (HTTP):
Connects to www.turktelekom.com.tr  (195.175.112.168:80)

TCP (HTTP):
Connects to vip1.g5.cachefly.net  (204.93.142.142:80)

TCP (HTTP SSL):
Connects to l1-ha.ycs.mxa.yahoo.com  (189.247.129.162:443)

TCP (HTTP):

TCP (HTTP):
Connects to gru09s17-in-f42.1e100.net  (216.58.222.42:80)

TCP (HTTP):
Connects to gru09s17-in-f35.1e100.net  (216.58.222.35:80)

TCP (HTTP SSL):
Connects to gru06s29-in-f138.1e100.net  (216.58.202.138:443)

TCP (HTTP):
Connects to gru06s26-in-f1.1e100.net  (216.58.202.1:80)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-gru2.facebook.com  (31.13.85.36:443)

TCP (HTTP):
Connects to ec2-54-247-172-33.eu-west-1.compute.amazonaws.com  (54.247.172.33:80)

TCP (HTTP SSL):
Connects to a23-14-229-55.deploy.static.akamaitechnologies.com  (23.14.229.55:443)

Remove lollipop_08291523.exe - Powered by Reason Core Security