carxdriftracing.zip__10924_i1535565538_il1243660.exe

LLC BK UKRBUDMONTAZH

The application carxdriftracing.zip__10924_i1535565538_il1243660.exe by LLC BK UKRBUDMONTAZH has been detected as adware by 28 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address server-54-192-55-174.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
LLC BK UKRBUDMONTAZH  (signed and verified)

Version:
1.1.8.22

MD5:
c2b2ccc078e9d2c8749d7cf2f0279898

SHA-1:
cb303701d25e3d1536c19c71bbda4b162f99ecff

SHA-256:
7a091d68b09f62b7fce90de0e5247abcbb3e647dbaa7389e61a4c11401fbc490

Scanner detections:
28 / 68

Status:
Adware

Analysis date:
4/19/2024 3:21:19 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.194436
5767256

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2015.06.16

Avira AntiVirus
ADWARE/Amonetize.617488.42
8.3.1.6

Arcabit
Trojan.Adware.Graftor.D2F784
1.0.0.425

avast!
Win32:Amonetize-JK [PUP]
150602-1

AVG
BundleApp
2016.0.3077

Bitdefender
Gen:Variant.Adware.Graftor.194436
1.0.20.830

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.Amonetize.DCAW
22460

Dr.Web
Trojan.Amonetize.2350
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.194436
10.0.0.5366

ESET NOD32
Win32/Amonetize.FC potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/Amonetize
6/15/2015

F-Secure
Gen:Variant.Adware.Graftor
5.14.151

G Data
Gen:Variant.Adware.Graftor.194436
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16247

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
15.0.0.543

Malwarebytes
PUP.Optional.Amonetize
v2015.06.15.03

MicroWorld eScan
Gen:Variant.Adware.Graftor.194436
16.0.0.498

NANO AntiVirus
Riskware.Win32.Amonetize.dsqpul
0.30.24.2086

Norman
Gen:Variant.Adware.Graftor.194436
02.06.2015 14:23:46

Panda Antivirus
PUP/Multitoolbar
15.06.15.03

Reason Heuristics
PUP.Amonitize.Installer
15.6.15.15

Sophos
Generic PUA ML
4.98

Trend Micro House Call
TROJ_GEN.R08NH07FD15
7.2.166

VIPRE Antivirus
Threat.4785227
40824

Zillya! Antivirus
Adware.Amonetize.Win32.3982
2.0.0.2225

File size:
603 KB (617,488 bytes)

Product version:
1.1.8.22

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\carxdriftracing.zip__10924_i1535565538_il1243660.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/2/2015 12:00:00 AM

Valid to:
3/1/2016 11:59:59 PM

Subject:
CN=LLC BK UKRBUDMONTAZH, O=LLC BK UKRBUDMONTAZH, STREET="street Kartvelishvili, 7/2", L=Kiev, S=Kiev, PostalCode=03148, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
34E84A9E0132F026B71D20920D491DAC

File PE Metadata
Compilation timestamp:
6/9/2015 3:54:21 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:zfd1FX9hZa4FaoXYK4f4EZsXc8Q/0GKLeJ0JNmu1facYlwqv:hVazooK4fsXcR/0GKKJwpYlt

Entry address:
0xA702

Entry point:
E8, 7B, 2B, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 08, AA, 37, 00, 85, C0, 75, 1D, E8, 76, 15, 00, 00, 6A, 1E, E8, CC, 15, 00, 00, 68, FF, 00, 00, 00, E8, 1E, 18, 00, 00, A1, 08, AA, 37, 00, 59, 59, 85, F6, 74, 04, 8B, CE, EB, 03, 33, C9, 41, 51, 6A, 00, 50, FF, 15, 64, 20, 37, 00, 8B, F8, 85, FF, 75, 26, 6A, 0C, 5B, 39, 05, 20, AD, 37, 00, 74, 0D, 56, E8, 62, 02, 00, 00, 59, 85, C0, 75, A9, EB, 07, E8, 77, 1F, 00, 00, 89, 18, E8, 70, 1F, 00, 00, 89, 18, 8B...
 
[+]

Code size:
67 KB (68,608 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-53-84.jfk6.r.cloudfront.net  (54.230.53.84:80)

TCP (HTTP):
Connects to server-54-192-55-174.jfk6.r.cloudfront.net  (54.192.55.174:80)

TCP (HTTP):
Connects to ec2-23-21-163-124.compute-1.amazonaws.com  (23.21.163.124:80)