spstub.exe

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application spstub.exe by ClientConnect has been detected as adware by 9 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from sp-storage.spccinta.com and multiple other hosts. While running, it connects to the Internet address offering.service.distributionengine.va.conduit-services.com on port 80 using the HTTP protocol.
Publisher:
Client Connect  (signed by ClientConnect LTD)

Description:
Search Protect

Version:
2.4.3.2

MD5:
2c9c3953842de6e7607e62c8d422be9e

SHA-1:
7d835a29714923e4fa0828d9533fdb58529461d5

SHA-256:
5396f7a3ee6cc9be53d14a2bbb7cd0ded1fd71716393b0dd642ad5c0d558cbc0

Scanner detections:
9 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
11/23/2024 8:18:26 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3376

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.14820

Dr.Web
Adware.Conduit.101
9.0.1.0232

ESET NOD32
Win32/ClientConnect (variant)
8.10284

IKARUS anti.virus
PUA.ClientConnect
t3scan.1.7.5.0

Malwarebytes
PUP.Optional.Conduit.A
v2014.08.20.01

Reason Heuristics
PUP.ClientConnect.G
14.8.20.13

Sophos
SearchProtect
4.98

VIPRE Antivirus
Conduit
32378

File size:
173.2 KB (177,384 bytes)

Copyright:
© 2014 Client Connect Ltd.

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\spstub.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
4/29/2014 1:00:00 AM

Valid to:
4/30/2016 12:59:59 AM

Subject:
CN=ClientConnect LTD, OU=SPStub, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
36AC210D3412C8646EB3F4C8EE541402

File PE Metadata
Compilation timestamp:
7/6/2011 3:31:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:pcmVWD5ltbmP3Q7yFClaOT96dAbHy7AobEdhq5wTU8XsnkSXQGpG+pcbc4b:emJINla9QS8wAq5w1XsXXbCbL

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Entropy:
7.8293

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file spstub.exe has been seen being distributed by the following 2 URLs.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ude.conduit-data.com  (54.197.244.95:80)

TCP (HTTP):

TCP (HTTP):
Connects to cms.distributionengine.conduit-services.com  (23.67.242.59:80)

 
http://cms.distributionengine.conduit-services.com//MainOffer/9194821/?CurrentStep=1&TotalSteps=5&DMVersion=1.1.8.4_Perion.9193698.04&Language=None

Remove spstub.exe - Powered by Reason Core Security