maintainer.exe

HulaToo

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application maintainer.exe by HulaToo has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “MaintainerSvc2.35.7151888”. While running, it connects to the Internet address ip-184-168-221-64.ip.secureserver.net on port 443.
Publisher:
HulaToo  (signed and verified)

Version:
1.0.5772.41657

MD5:
d9d6b0ee6aeb518df4f1ca22972671ac

SHA-1:
5f39d81b7437d1df8cb515a38b8ae8cefe84b78d

SHA-256:
1b357af4d6b066fee695ba1d9b64f46547e591b71d8596e5629a356610b0c191

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
11/16/2024 5:58:20 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo.HulaToo (M)
15.12.12.20

File size:
125.2 KB (128,240 bytes)

Product version:
1.0.5772.41657

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\46a7822e-e081-4280-9f6b-e4649130bea1\maintainer.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/16/2015 11:00:00 AM

Valid to:
4/15/2016 10:59:59 AM

Subject:
CN=HulaToo, O=HulaToo, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
085C145DCAAAEB713C3C6B3E2BFDBFE3

File PE Metadata
Compilation timestamp:
10/22/2015 5:08:39 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:fD1Ll2ZpujSiZF4gysym2UG0IHhxDOHdVh:fBVDFHlKuHfh

Entry address:
0x9872

Entry point:
E8, 75, 62, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 68, C2, 41, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 59, 50, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 7A, F3, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Code size:
72.5 KB (74,240 bytes)

Service
Display name:
MaintainerSvc2.35.7151888

Type:
Win32OwnProcess

Depends on:
RPCSS


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP SSL):
Connects to ip-184-168-221-64.ip.secureserver.net  (184.168.221.64:443)

Remove maintainer.exe - Powered by Reason Core Security