smu.exe

W

Search Module Ltd.

The application smu.exe, “Search Module Update Service” has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Search Module Update”. While running, it connects to the Internet address server-54-230-0-126.lhr5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Search Module Ltd.

Product:
W

Description:
Search Module Update Service

Version:
2, 6, 8, 5699

MD5:
f04c5031ab968a3bf7fbe7cce1687dba

SHA-1:
dcc2c430cf84828f62923900009719703b5065f8

SHA-256:
37883bcb7fb3aa8eaa80b2b3effef8145b1a5015ee2a7d6908d2c77f0f247b7f

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 1:53:53 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Search.Toolbar (M)
17.2.8.21

File size:
3 MB (3,109,888 bytes)

Product version:
2, 6, 8, 5699

Copyright:
Copyright (C) 2014

Original file name:
smu.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Common path:
C:\Program Files\common files\noobzo\gnupdate\smu.exe

File PE Metadata
Compilation timestamp:
2/8/2017 12:46:14 PM

OS version:
5.2

OS bitness:
Win64

Subsystem:
Windows Console

Linker version:
14.0

Entry address:
0x12AC90

Entry point:
48, 83, EC, 28, E8, 57, 09, 00, 00, 48, 83, C4, 28, E9, 66, FE, FF, FF, CC, CC, 48, 8B, C4, 48, 89, 58, 18, 48, 89, 70, 20, 48, 89, 50, 10, 48, 89, 48, 08, 57, 41, 56, 41, 57, 48, 83, EC, 30, 49, 8B, F1, 4D, 8B, F8, 4C, 8B, F2, 48, 8B, F9, 33, DB, 48, 89, 58, E0, 88, 58, D8, 49, 3B, DF, 74, 1F, 48, 8B, CE, E8, AA, 04, 00, 00, 48, 8B, CF, FF, D6, 49, 03, FE, 48, 89, 7C, 24, 50, 48, FF, C3, 48, 89, 5C, 24, 28, EB, DC, C6, 44, 24, 20, 01, 48, 8B, 5C, 24, 60, 48, 8B, 74, 24, 68, 48, 83, C4, 30, 41, 5F, 41, 5E...
 
[+]

Entropy:
6.2430

Code size:
2.1 MB (2,196,480 bytes)

Service
Display name:
Search Module Update

Service name:
SMUpd

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-19-58.iad12.r.cloudfront.net  (54.192.19.58:80)

TCP (HTTP):
Connects to server-54-230-206-19.atl50.r.cloudfront.net  (54.230.206.19:80)

TCP (HTTP):
Connects to server-54-230-206-230.atl50.r.cloudfront.net  (54.230.206.230:80)

TCP (HTTP):
Connects to server-54-230-206-25.atl50.r.cloudfront.net  (54.230.206.25:80)

TCP (HTTP):
Connects to server-54-230-206-167.atl50.r.cloudfront.net  (54.230.206.167:80)

TCP (HTTP):
Connects to server-54-230-206-252.atl50.r.cloudfront.net  (54.230.206.252:80)

TCP (HTTP):
Connects to server-54-230-206-119.atl50.r.cloudfront.net  (54.230.206.119:80)

TCP (HTTP):
Connects to server-54-230-206-35.atl50.r.cloudfront.net  (54.230.206.35:80)

TCP (HTTP):
Connects to server-54-230-206-13.atl50.r.cloudfront.net  (54.230.206.13:80)

TCP (HTTP):
Connects to server-54-192-159-193.sin3.r.cloudfront.net  (54.192.159.193:80)

TCP (HTTP):
Connects to server-54-230-206-34.atl50.r.cloudfront.net  (54.230.206.34:80)

TCP (HTTP):
Connects to server-54-230-11-21.lhr3.r.cloudfront.net  (54.230.11.21:80)

TCP (HTTP):
Connects to server-54-230-5-157.dfw3.r.cloudfront.net  (54.230.5.157:80)

TCP (HTTP):
Connects to server-54-230-163-236.jax1.r.cloudfront.net  (54.230.163.236:80)

TCP (HTTP):
Connects to server-54-230-163-174.jax1.r.cloudfront.net  (54.230.163.174:80)

TCP (HTTP):
Connects to server-54-230-0-126.lhr5.r.cloudfront.net  (54.230.0.126:80)

TCP (HTTP):
Connects to server-54-192-59-179.gru1.r.cloudfront.net  (54.192.59.179:80)

TCP (HTTP):
Connects to server-54-192-203-193.fra50.r.cloudfront.net  (54.192.203.193:80)

TCP (HTTP):
Connects to server-54-192-19-115.iad12.r.cloudfront.net  (54.192.19.115:80)

TCP (HTTP):
Connects to server-54-192-159-97.sin3.r.cloudfront.net  (54.192.159.97:80)

Remove smu.exe - Powered by Reason Core Security