bzjpmuulvu.exe

Storm Alert

Rational Thought Solutions

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application bzjpmuulvu.exe, “StormAlert Service” by Rational Thought Solutions has been detected as adware by 5 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “bZJPmuULvu”. According to AVG, this software downloads additional adware offers during setup.
Publisher:
Rational Thought Solutions  (signed and verified)

Product:
Storm Alert

Description:
StormAlert Service

Version:
1.0.0.0

MD5:
f11f1b46da2160535d943528cba54885

SHA-1:
3bcbe4d2c3a3263fb34da82aea55f85df207fe7f

SHA-256:
f63a69ef612461622c6f56fd51a681f93010efb99d6e98adba5f04b220d56deb

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/25/2024 2:21:57 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.189.6

AVG
Downloader
2015.0.3278

ESET NOD32
MSIL/Adware.PullUpdate.G.gen (variant)
8.10786

IKARUS anti.virus
PUA.Downloader
t3scan.1.8.3.0

Reason Heuristics
PUP.Service.RationalThoughtSolutions.K
14.11.26.22

File size:
2.6 MB (2,726,776 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Rational Thought Solutions 2014

Original file name:
StormAlertService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\vnjfxcga\bzjpmuulvu.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/16/2014 5:00:00 PM

Valid to:
3/17/2015 4:59:59 PM

Subject:
CN=Rational Thought Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Rational Thought Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
14448451C4ACAC4A2AACA637288DB659

File PE Metadata
Compilation timestamp:
11/23/2014 4:37:54 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
49152:SOpo0YSiWSDJ2Z7v3xVqIVzIEnrhhM9rmP17E5vuE8IZ3sdB1nmwk4oeY:Hoh1emIVUErnQm1auE8/1WteY

Entry address:
0x2995BE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.9996

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.6 MB (2,717,184 bytes)

Service
Display name:
bZJPmuULvu

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-76-91-10.eu-west-1.compute.amazonaws.com  (54.76.91.10:80)

TCP (HTTP):
Connects to ec2-54-171-43-206.eu-west-1.compute.amazonaws.com  (54.171.43.206:80)

TCP (HTTP):
Connects to ec2-34-250-194-62.eu-west-1.compute.amazonaws.com  (34.250.194.62:80)

TCP (HTTP):
Connects to ec2-52-16-174-255.eu-west-1.compute.amazonaws.com  (52.16.174.255:80)

TCP (HTTP):
Connects to ec2-54-171-226-204.eu-west-1.compute.amazonaws.com  (54.171.226.204:80)

TCP (HTTP):
Connects to ec2-54-246-181-97.eu-west-1.compute.amazonaws.com  (54.246.181.97:80)

TCP (HTTP):
Connects to ec2-52-16-46-192.eu-west-1.compute.amazonaws.com  (52.16.46.192:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-37-165-163.deploy.static.akamaitechnologies.com  (23.37.165.163:80)

Remove bzjpmuulvu.exe - Powered by Reason Core Security