sweetplayer_tsv62gf2k.exe

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The file sweetplayer_tsv62gf2k.exe by ClientConnect has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from dde.de.abadabout-home.com. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
ClientConnect LTD  (signed and verified)

MD5:
bc8b1e07de3f2ea74ffa0d86f2268086

SHA-1:
dea507bc34419fe6fe82a3943d03bbb2501f57f2

SHA-256:
4a65071400a957d2beb10b9d9dc90295211b55de2542f3b3687c2f45381971a6

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
11/24/2024 3:35:18 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Conduit.ClientConnect.Installer (M)
16.1.3.15

File size:
624.2 KB (639,176 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\sweetplayer_tsv62gf2k.exe.70r8450.partial

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/3/2014 4:00:00 PM

Valid to:
2/5/2016 3:59:59 PM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=DM5, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2DCB2B741B681B5D93FC300D0AE685E5

File PE Metadata
Compilation timestamp:
2/24/2012 11:19:59 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:EEdAIao3GaNu+GgGrhKsVQ37OAMQHpZ8rZ+DhSc6cT2cBsL/lAypPBBQpA:E6Qo3HJGgWhhVQCQHYrU3TDBkljfr

Entry address:
0x39E3

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 91, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, C0, 82, 40, 00, 6A, 08, A3, B8, 2E, 47, 00, E8, 37, 2A, 00, 00, 55, 68, B4, 02, 00, 00, A3, D0, 2D, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 93, 40, 00, FF, 15, 84, 81, 40, 00, 68, 04, 93, 40, 00, 68, C0, AD, 46, 00, E8, 19, 27, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 30, 4C, 00, 57, E8, 07, 27, 00, 00...
 
[+]

Entropy:
7.9522

Packer / compiler:
Nullsoft install system v2.x

Code size:
28 KB (28,672 bytes)

The file sweetplayer_tsv62gf2k.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/42264238/42285361/?mainofferId=42260804&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.2.22.42284227.01&Language=US-EN

Remove sweetplayer_tsv62gf2k.exe - Powered by Reason Core Security