36316498-b3d9-47dd-98ae-f60936fb007c-11.exe

Apps Hat

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application 36316498-b3d9-47dd-98ae-f60936fb007c-11.exe by Sailor Project has been detected as adware by 22 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Nero  (signed by Sailor Project)

Product:
Apps Hat

Description:
Apps Hat exe

Version:
1000.1000.1000.1000

MD5:
705473b1ca27d259e1b17ac8139283fc

SHA-1:
66a0905e57c139f85a8bbe45dfc31ac5bee6dc92

SHA-256:
dfa9f4f24195d24e89a128ccbd157f0a8981b8ffd4ba2ff18ea2166e756c190a

Scanner detections:
22 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/25/2024 11:13:15 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Plush.1
872

AhnLab V3 Security
PUP/Win32.CrossRider
2014.09.14

Avira AntiVirus
Adware/CrossRider.pq
7.11.171.238

avast!
Win32:Crossrider-N [PUP]
140908-2

AVG
Generic
2015.0.3350

Baidu Antivirus
Adware.Win32.GoogUpdate
4.0.3.14915

Bitdefender
Gen:Variant.Adware.Plush.1
1.0.20.1290

Dr.Web
Trojan.Crossrider.31451
9.0.1.0318

Emsisoft Anti-Malware
Gen:Variant.Adware.Plush
8.14.09.15.12

ESET NOD32
Win32/Toolbar.CrossRider.AQ (variant)
8.10413

F-Secure
Gen:Variant.Adware.Plush.1
11.2014-15-09_2

G Data
Gen:Variant.Adware.Plush
14.9.24

herdProtect (fuzzy)
2014.11.14.20

K7 AntiVirus
Adware
13.183.13358

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3247

Malwarebytes
PUP.Optional.iWebar.A
v2014.09.15.01

MicroWorld eScan
Gen:Variant.Adware.Plush.1
15.0.0.774

NANO AntiVirus
Riskware.Win32.Crossrider.deywzm
0.28.2.61942

Panda Antivirus
Trj/Genetic.gen
14.09.15.01

Qihoo 360 Security
Win32/Trojan.3b1
1.0.0.1015

Reason Heuristics
PUP.Crossrider.SailorProject.h
14.9.15.12

VIPRE Antivirus
Crossrider
33094

File size:
1.9 MB (1,972,072 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Apps Hat.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\apps hat\36316498-b3d9-47dd-98ae-f60936fb007c-11.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 1:00:00 AM

Valid to:
7/19/2015 12:59:59 AM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
9/13/2014 11:05:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:lvoS6qEC4r3JKiEuY83ApSWmpTtUzn+nPRxF:lwSab4ithD1

Entry address:
0xED014

Entry point:
E8, 3A, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, 6D, 01, 01, 00, 3B, 30, 7C, 07, E8, 64, 01, 01, 00, 8B, 30, E8, 57, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 60, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, 70, 36, 55, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7A, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, 70, 36, 55, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, D1, ED...
 
[+]

Code size:
1.1 MB (1,144,320 bytes)

Scheduled Task
Task name:
36316498-b3d9-47dd-98ae-f60936fb007c-11

Trigger:
Logon (Runs on logon)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip-50-63-202-33.ip.secureserver.net  (50.63.202.33:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.42:80)

Remove 36316498-b3d9-47dd-98ae-f60936fb007c-11.exe - Powered by Reason Core Security