tmp00000002a43d81058e8d895f

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The file tmp00000002a43d81058e8d895f, “WebSocket4Net for .NET 2.0” by Sailor Project has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
WebSocket4Net  (signed by Sailor Project)

Product:
WebSocket4Net

Description:
WebSocket4Net for .NET 2.0

Version:
0.9.0.0

MD5:
858e6b37ead57fffe45a422836d61bd6

SHA-1:
ae01fb4865f00f6186f4b7f344d563785db0ecc2

SHA-256:
b1f710c7311ec7d9c0f0e49a5917515bb9913f6d292abd031019a80cdfd8fe5e

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/24/2024 3:16:25 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcircle (M)
17.3.15.2

File size:
512 KB (524,288 bytes)

Product version:
0.9.0.0

Copyright:
Copyright © websocket4net.codeplex.com 2012

Original file name:
WebSocket4Net.dll

Language:
Language Neutral

Common path:
C:\windows\temp\tmp00000002a43d81058e8d895f

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 7:00:00 AM

Valid to:
7/19/2015 6:59:59 AM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
5/26/2014 8:13:38 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xFFCE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 48, 00, 00, 00, 58, 00, 01, 00, AC, 03...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
56 KB (57,344 bytes)

Remove tmp00000002a43d81058e8d895f - Powered by Reason Core Security