utilnetcrawl.exe

Traditional Board

The application utilnetcrawl.exe by Traditional Board has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Update NetCrawl”. While running, it connects to the Internet address www.turktelekom.com.tr on port 80 using the HTTP protocol.
Publisher:
Traditional Board  (signed and verified)

Version:
1.0.6283.15043

MD5:
869ae19b817ffb4488520a146c8ac3c9

SHA-1:
3259d7ba8c1e8f154035a1d84dd1342ed30ab5b2

SHA-256:
68fa0dc0b01e02975646cb12259e3f130b5bd48d979f5e1c60ec5e7862d15824

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/24/2024 2:45:46 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.3.15.21

File size:
648.7 KB (664,272 bytes)

Product version:
1.0.6283.15043

Original file name:
NetCrawl2017031516.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\netcrawl\bin\utilnetcrawl.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/6/2016 7:00:00 AM

Valid to:
6/7/2017 6:59:59 AM

Subject:
CN=Traditional Board, O=Traditional Board, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2784E3C1D18AF32B18E6EF14E2B94148

File PE Metadata
Compilation timestamp:
3/15/2017 11:21:33 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xA1F16

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.2003

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
640 KB (655,360 bytes)

Service
Display name:
Update NetCrawl

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.turktelekom.com.tr  (195.175.116.81:80)

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.234.75:80)

TCP (HTTP):

Remove utilnetcrawl.exe - Powered by Reason Core Security