utilnetcrawl.exe

Traditional Board

The application utilnetcrawl.exe by Traditional Board has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Util NetCrawl”.
Publisher:
Traditional Board  (signed and verified)

Version:
1.0.6262.5694

MD5:
f95ea151c00b08d858e3c4b45eb92b90

SHA-1:
ccb01ff3f0d9a65a7519afd41b5b7de28763eb92

SHA-256:
104676fd28f7568139f648b93731ddddc8535ba8f4d0280ec4234a3a66d50778

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 6:03:11 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.2.22.14

File size:
631.2 KB (646,352 bytes)

Product version:
1.0.6262.5694

Original file name:
NetCrawl2017022211.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\netcrawl\bin\utilnetcrawl.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/5/2016 5:00:00 PM

Valid to:
6/6/2017 4:59:59 PM

Subject:
CN=Traditional Board, O=Traditional Board, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2784E3C1D18AF32B18E6EF14E2B94148

File PE Metadata
Compilation timestamp:
2/22/2017 3:09:57 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x9D842

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1156

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
622.5 KB (637,440 bytes)

Service
Display name:
Util NetCrawl

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a104-115-161-73.deploy.static.akamaitechnologies.com  (104.115.161.73:80)

Remove utilnetcrawl.exe - Powered by Reason Core Security