PastaLeadsService.exe

PastaLeadsService

One Call Ltd

The application PastaLeadsService.exe by One Call has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This executable runs as a local area network (LAN) Internet proxy server listening on port 8800 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. This file is typically installed with the program PastaQuotes by One Call Ltd which is a potentially unwanted software program. While running, it connects to the Internet address 149-210-169-43.colo.transip.net on port 80 using the HTTP protocol.
Publisher:
One Call Ltd  (signed and verified)

Product:
PastaLeadsService

Version:
1.2.1.0

MD5:
763fa84579e35a1b76dfea387bc844f4

SHA-1:
78a87d5ba6f9dfaa70a2e774623ce7f6ab5bc5af

SHA-256:
4476405d08ed76411fcdff4d268cb3e79610ccbd1eade46f07bbb20efda11740

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/28/2024 12:24:31 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.OneCall.R
14.7.30.16

File size:
375.4 KB (384,408 bytes)

Product version:
1.2.1.0

Copyright:
Onecall LTD © 2014

Original file name:
PastaLeadsService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\pastaleads\pastaleadsservice.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
12/30/2013 5:00:00 PM

Valid to:
12/31/2014 4:59:59 PM

Subject:
CN=One Call Ltd, O=One Call Ltd, STREET=Zarhin 10, L=Raanana, S=IL, PostalCode=12345, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3319A851B8E5EE29CCF776BCF148B091

File PE Metadata
Compilation timestamp:
6/18/2014 12:38:20 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:dAAK2x8gHVg8potIzAGtLbNQdEpEtouRyV+BoWn+:q48gHVh2tIzAGBbNFwb5+

Entry address:
0x5DBBE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.7681

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
367 KB (375,808 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:8800/

Local host port:
8800

Default credentials:
No


The file PastaLeadsService.exe has been discovered within the following program.

PastaQuotes  by One Call Ltd
PastaQuotes/PastaLeads is an web browser advertisement extension that delivers ads to the user's web browser. Ads are in the form of traditional banners as well as context-hyper links.
84% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):

TCP (HTTP SSL):
Connects to pr.comet.vip.ne1.yahoo.com  (98.138.79.73:443)

TCP (HTTP SSL):
Connects to pr.comet.vip.bf1.yahoo.com  (66.196.116.112:443)

TCP:
Connects to pe-in-f188.1e100.net  (74.125.20.188:5228)

TCP (HTTP):
Connects to ec2-50-112-249-78.us-west-2.compute.amazonaws.com  (50.112.249.78:80)

TCP (HTTP):
Connects to ec2-184-72-249-217.compute-1.amazonaws.com  (184.72.249.217:80)

TCP (HTTP):
Connects to consolari.io  (178.62.23.43:80)

TCP (HTTP SSL):
Connects to a23-212-21-198.deploy.static.akamaitechnologies.com  (23.212.21.198:443)

TCP (HTTP SSL):
Connects to yts2.yql.vip.bf1.yahoo.com  (98.137.201.232:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-04-sea1.fbcdn.net  (31.13.76.20:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-03-sea1.fbcdn.net  (31.13.76.4:443)

TCP (HTTP SSL):
Connects to www.yammer.com  (204.152.18.206:443)

TCP (HTTP):
Connects to videohelp.com  (85.17.24.140:80)

TCP (HTTP SSL):
Connects to UNKNOWN-69-147-78-X.yahoo.com  (69.147.78.32:443)

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to server-54-230-21-135.ewr2.r.cloudfront.net  (54.230.21.135:80)

TCP (HTTP):
Connects to server-216-137-43-59.dfw3.r.cloudfront.net  (216.137.43.59:80)

TCP (HTTP):
Connects to server-216-137-43-116.dfw3.r.cloudfront.net  (216.137.43.116:80)

TCP (HTTP SSL):
Connects to sea09s17-in-f30.1e100.net  (173.194.33.158:443)

Remove PastaLeadsService.exe - Powered by Reason Core Security