nsi8549.tmp

Search Protect

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The file nsi8549.tmp by ClientConnect has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from sp-storage.spccint.com and multiple other hosts.
Publisher:
Client Connect LTD  (signed by ClientConnect LTD)

Product:
Search Protect

Version:
3.1.5.28

MD5:
6b6fce60031ee65283b65c034d65e7ae

SHA-1:
417d7aa9cace8d03f6af7c949c2b15a549dc74ab

SHA-256:
fc938a557836e131bd13fa2ac24579d808a9053638722d545c683bfc184fad0a

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
11/27/2024 2:57:01 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Conduit (M)
16.11.23.22

File size:
9 MB (9,409,784 bytes)

Product version:
3.1.5.28

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
SearchProtect

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\nsi8549.tmp

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/31/2014 1:00:00 AM

Valid to:
12/27/2016 12:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Safe Search, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
354F4C7E49A131A6E4BF89B253C78A2D

File PE Metadata
Compilation timestamp:
7/6/2011 4:31:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
196608:S4dQxHU5kec7dhy1y9z/YOEWFIea/O0QoIXPCahLu9UX:SqQt9ec7dQcFYO2ea/copKX

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file nsi8549.tmp has been seen being distributed by the following 2 URLs.

http://sp-storage.spccint.com/Installer/.../Setup.exe

http://sp-storage.spccint.com/Installer/.../Setup.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):
Connects to a172-227-168-170.deploy.static.akamaitechnologies.com  (172.227.168.170:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-84-170-196.deploy.static.akamaitechnologies.com  (104.84.170.196:80)

TCP (HTTP):
Connects to a104-74-136-186.deploy.static.akamaitechnologies.com  (104.74.136.186:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-78-249-111.deploy.static.akamaitechnologies.com  (23.78.249.111:80)

TCP (HTTP):
Connects to ec2-54-225-182-66.compute-1.amazonaws.com  (54.225.182.66:80)

TCP (HTTP):
Connects to ec2-23-23-99-139.compute-1.amazonaws.com  (23.23.99.139:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-81-179-35.deploy.static.akamaitechnologies.com  (104.81.179.35:80)

TCP (HTTP):

TCP (HTTP):
Connects to a104-80-126-137.deploy.static.akamaitechnologies.com  (104.80.126.137:80)

TCP (HTTP):
Connects to a104-73-10-133.deploy.static.akamaitechnologies.com  (104.73.10.133:80)

TCP (HTTP):
Connects to a96-7-59-102.deploy.akamaitechnologies.com  (96.7.59.102:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-39-174-166.deploy.static.akamaitechnologies.com  (23.39.174.166:80)

TCP (HTTP):
Connects to a23-217-39-157.deploy.static.akamaitechnologies.com  (23.217.39.157:80)

TCP (HTTP):
Connects to a23-214-155-116.deploy.static.akamaitechnologies.com  (23.214.155.116:80)

TCP (HTTP):
Connects to a23-213-199-58.deploy.static.akamaitechnologies.com  (23.213.199.58:80)

Remove nsi8549.tmp - Powered by Reason Core Security