utiladvanceelite.exe

Crazy Front

The application utiladvanceelite.exe by Crazy Front has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Util AdvanceElite”. While running, it connects to the Internet address 115-167-72-106-dynamic.wi-tribe.net.pk on port 80 using the HTTP protocol.
Publisher:
Crazy Front  (signed and verified)

Version:
1.0.6270.11421

MD5:
7ef3b000aa3d32e4a7ceec612cad13e8

SHA-1:
51939adea43b70b7daf01a46bd302e6bc3210316

SHA-256:
7f089811b72430eb2f737c93a805ab113f604d19b067c13b4c5d31ebbd256ea2

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 4:57:43 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.3.2.16

File size:
646.7 KB (662,208 bytes)

Product version:
1.0.6270.11421

Original file name:
AdvanceElite2017030214.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\advanceelite\bin\utiladvanceelite.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/26/2016 2:00:00 AM

Valid to:
4/27/2018 1:59:59 AM

Subject:
CN=Crazy Front, O=Crazy Front, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4BF04280E52E29F504217BA1219F0B9C

File PE Metadata
Compilation timestamp:
3/2/2017 3:20:50 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xA1756

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
638 KB (653,312 bytes)

Service
Display name:
Util AdvanceElite

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a88-221-112-74.deploy.akamaitechnologies.com  (88.221.112.74:80)

TCP (HTTP):
Connects to 115-167-72-106-dynamic.wi-tribe.net.pk  (115.167.72.106:80)

TCP (HTTP):
Connects to a23-200-86-152.deploy.static.akamaitechnologies.com  (23.200.86.152:80)

TCP (HTTP):
Connects to a88-221-112-88.deploy.akamaitechnologies.com  (88.221.112.88:80)

TCP (HTTP):
Connects to a184-51-126-186.deploy.static.akamaitechnologies.com  (184.51.126.186:80)

TCP (HTTP):
Connects to a184-51-126-152.deploy.static.akamaitechnologies.com  (184.51.126.152:80)

TCP (HTTP):
Connects to a104-93-204-148.deploy.static.akamaitechnologies.com  (104.93.204.148:80)

Remove utiladvanceelite.exe - Powered by Reason Core Security