CCProxy.EXE

CCProxy

Youngzsoft

The application CCProxy.EXE has been detected as adware by 13 anti-malware scanners. While running, it connects to the Internet address server26101.teamviewer.com on port 5938.
Publisher:
Youngzsoft

Product:
CCProxy

Version:
6, 6, 4, 0

MD5:
e7ef1acce4bdf78a74cb7eb25330e120

SHA-1:
4697350c87dd4e6d7f2b262629322de75969fb8b

Scanner detections:
13 / 68

Status:
Adware

Analysis date:
4/25/2024 1:31:05 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.CCProxy
7.1.1

AhnLab V3 Security
Unwanted/Win32.CCProxy
2014.06.04

avast!
Win32:CCProxy-D [PUP]
2014.9-140610

Dr.Web
Program.CCProxy.143
9.0.1.0161

ESET NOD32
Win32/CCProxy (variant)
8.9888

Fortinet FortiGate
Riskware/CCProxy
6/10/2014

Kaspersky
not-a-virus:Server-Proxy.Win32.CCProxy
14.0.0.3734

Malwarebytes
Trojan.Proxy.CC
v2014.06.10.04

NANO AntiVirus
Riskware.Win32.CCProxy.brkajt
0.28.0.60100

Reason Heuristics
PUP.Youngzsoft.H
14.6.10.4

Trend Micro House Call
HKTL_CCPROXY
7.2.161

Trend Micro
HKTL_CCPROXY
10.465.10

VIPRE Antivirus
Trojan.Win32.Generic
29902

File size:
1.1 MB (1,165,312 bytes)

Product version:
6, 6, 4, 0

Copyright:
Copyright(C) 2000

Original file name:
CCProxy.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

File PE Metadata
Compilation timestamp:
3/28/2011 5:57:39 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:SBIH6Y279g0G2Dd6lCYCP3SWRuxooyUlzt:SCH6Y49g0pDd6ln4Iyyt

Entry address:
0x747DE

Entry point:
E8, A6, E4, 00, 00, E9, 78, FE, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, C0, 27, 4B, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, C0, 27, 4B, 00, 33, C5, 50, 89, 65, F0, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B...
 
[+]

Code size:
571 KB (584,704 bytes)

Windows Firewall Allowed Program
Name:
C:\CCProxy\CCProxy.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip-172-16-200-200.ec2.internal  (172.16.200.200:8080)

TCP (HTTP):
Connects to a23-215-130-194.deploy.static.akamaitechnologies.com  (23.215.130.194:80)

TCP (HTTP SSL):
Connects to edge-video-shv-01-lga3.fbcdn.net  (31.13.71.14:443)

TCP (HTTP SSL):
Connects to edge-star-shv-01-lga3.facebook.com  (31.13.71.1:443)

TCP (HTTP):
Connects to a23-215-130-209.deploy.static.akamaitechnologies.com  (23.215.130.209:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-lga3.fbcdn.net  (31.13.71.7:443)

TCP (HTTP):
Connects to server-54-192-36-130.jfk1.r.cloudfront.net  (54.192.36.130:80)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-lga3.facebook.com  (31.13.71.36:443)

TCP (HTTP):
Connects to a23-215-130-218.deploy.static.akamaitechnologies.com  (23.215.130.218:80)

TCP (HTTP SSL):
Connects to a104-117-10-130.deploy.static.akamaitechnologies.com  (104.117.10.130:443)

TCP (HTTP SSL):
Connects to 60-199-250-49.static.tfn.net.tw  (60.199.250.49:443)

TCP (HTTP SSL):
Connects to zymail.zyxel.com.tw  (219.87.158.116:443)

TCP:
Connects to wn-in-f188.1e100.net  (74.125.71.188:5228)

TCP (HTTP SSL):
Connects to wm-in-f189.1e100.net  (64.233.166.189:443)

TCP (HTTP SSL):
Connects to wb-in-f189.1e100.net  (66.102.1.189:443)

TCP:
Connects to wb-in-f188.1e100.net  (66.102.1.188:5228)

TCP (HTTP SSL):
Connects to static.khi77.pie.net.pk  (221.120.207.59:443)

TCP:
Connects to static.88-198-44-186.clients.your-server.de  (88.198.44.186:18010)

TCP (HTTP):
Connects to static.88-198-44-181.clients.your-server.de  (88.198.44.181:80)

TCP (HTTP SSL):
Connects to server-54-192-36-20.jfk1.r.cloudfront.net  (54.192.36.20:443)

Remove CCProxy.EXE - Powered by Reason Core Security