browsers app-codedownloader.exe

Browsers App

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application browsers app-codedownloader.exe by Sailor Project has been detected as adware by 42 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for app extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
app  (signed by Sailor Project)

Product:
Browsers App

Description:
Browsers App exe

Version:
1000.1000.1000.1000

MD5:
1d5cf518e317c297f623696620bf5b3a

SHA-1:
fb63d19efe2f19accd3c6f06aa12ad0527760a08

SHA-256:
f043f38fdcf289bef6d1735bf7282736f6b9907ef71629396b8811e9d200008a

Scanner detections:
42 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Sailor Project.

Analysis date:
4/26/2024 1:52:59 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
867

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
PUP/Win32.PlusHD
2014.07.23

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.164.2

avast!
Win32:Adware-gen [Adw]
2014.9-140920

AVG
Generic
2015.0.3345

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14920

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1315

Bkav FE
W32.Sality.PE
1.3.0.4959

Clam AntiVirus
Win.Adware.Agent-7332
0.98/19185

Comodo Security
Virus.Win32.Sality.Gen
18804

Dr.Web
Trojan.Crossrider.17413
9.0.1.0263

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.09.20.09

ESET NOD32
Win32/Toolbar.CrossRider.AK potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Riskware/Toolbar_CrossRider
9/20/2014

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-20-09_7

G Data
Gen:Variant.Adware.Kazy.374109
14.9.24

herdProtect (fuzzy)
2014.12.3.10

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.180.12643

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
14.0.0.3220

Malwarebytes
PUP.Optional.TornTV.A
v2014.09.20.09

McAfee
Artemis!CD086B52495E
5600.7001

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.789

NANO AntiVirus
Riskware.Win32.AdLoad.dbdvli
0.28.2.60990

Norman
Sality.ZHB
11.20140920

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
Trj/Genetic.gen
14.09.20.09

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
9.14.14.00

Reason Heuristics
PUP.Crossrider.Task.BB
14.9.20.21

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14918

Sophos
Generic PUA CL
4.98

Total Defense
Win32/Sality.AA
37.0.11046

Trend Micro House Call
PE_SALITY.RL
7.2.263

Trend Micro
PE_SALITY.RL
10.465.20

Vba32 AntiVirus
AdWare.AdLoad
3.12.26.3

VIPRE Antivirus
Threat.4789396
31208

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1850

File size:
561.9 KB (575,336 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Browsers App.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\browsers app\browsers app-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/17/2014 7:00:00 PM

Valid to:
7/18/2015 6:59:59 PM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
7/28/2014 8:27:22 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:cOoKsK13NQ8CpZXgC5Eo1hg3pPBe+fS4bpTjsBD+o:cOvfqt59O461T4BKo

Entry address:
0x48D33

Entry point:
E8, B8, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Entropy:
6.4245

Code size:
443.5 KB (454,144 bytes)

Scheduled Task
Task name:
4b527752-7a7b-4cd3-a881-a52cc99f21f0-1

Trigger:
Logon (Runs on logon)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/000568/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove browsers app-codedownloader.exe - Powered by Reason Core Security