utilfollowrules.exe

Geowide

The application utilfollowrules.exe by Geowide has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Util Follow Rules”. While running, it connects to the Internet address eu-us.cdn.hiberniacdn.com on port 80 using the HTTP protocol.
Publisher:
Geowide  (signed and verified)

Version:
1.0.6249.12198

MD5:
5e8dfd4782f7d624bee96b7cdb1f0de1

SHA-1:
884ec0819377139d7073893d10821f48c0009842

SHA-256:
a657fe57e13e22c26ae47bebdf971e1e13c16ea5068c947fb0812ab4e3dc22df

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/27/2024 1:13:49 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.2.9.15

File size:
638.4 KB (653,728 bytes)

Product version:
1.0.6249.12198

Original file name:
FollowRules2017020914.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\follow rules\bin\utilfollowrules.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
10/20/2016 10:00:00 PM

Valid to:
10/21/2017 8:59:59 PM

Subject:
CN=Geowide, O=Geowide, L=San Diego, S=California, C=US

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
05EDA5D2409A581DDAF90CD466140FF1

File PE Metadata
Compilation timestamp:
2/9/2017 12:46:44 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x9F7F2

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, F0, 09, 00, 0C, 00, 00, 00, F4, 37, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
630 KB (645,120 bytes)

Service
Display name:
Util Follow Rules

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to host-213.158.175.90.tedata.net  (213.158.175.90:80)

TCP (HTTP):
Connects to host-213.158.175.99.tedata.net  (213.158.175.99:80)

TCP (HTTP):
Connects to eu-us.cdn.hiberniacdn.com  (128.127.159.5:80)

TCP (HTTP):
Connects to a23-35-126-184.deploy.static.akamaitechnologies.com  (23.35.126.184:80)

Remove utilfollowrules.exe - Powered by Reason Core Security