a2-downloader.exe

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application a2-downloader.exe by ClientConnect has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from s3-us-west-2.amazonaws.com. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
Client Connect  (signed by ClientConnect LTD)

Description:
Search Protect

Version:
2.9.9.9

MD5:
6ed7df48e0b5ccfd71c504587e472910

SHA-1:
ed92da8c65a6c8d79338a044ef8f5a6eecba429a

SHA-256:
cce7eb23f40220afd3c01a4268e3b0f0d21e739f21ef7f2632b590ffe6ab7a7e

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
4/25/2024 7:26:34 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Conduit.ClientCo.Installer (M)
16.4.22.15

File size:
173.1 KB (177,296 bytes)

Copyright:
© 2014 Client Connect Ltd.

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\a2-downloader.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
4/29/2014 2:00:00 AM

Valid to:
4/30/2016 1:59:59 AM

Subject:
CN=ClientConnect LTD, OU=SPStub, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
36AC210D3412C8646EB3F4C8EE541402

File PE Metadata
Compilation timestamp:
7/6/2011 4:31:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:ecmVWD5ltbmP3Q7yZCaFuswiBj1N3AxFt5rjjcZ00ognTFu45Ir7dsYNVsy:lmJIZauFQj/mvTuogTFZ6q2

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file a2-downloader.exe has been seen being distributed by the following URL.

https://s3-us-west-2.amazonaws.com/.../a2-downloader.exe

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/137420600/137441723/?mainofferId=137417166&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.3.37.137440589.01&Language=US-EN

Remove a2-downloader.exe - Powered by Reason Core Security