citrio.exe

Citrio

Catalina Group Limited

The application citrio.exe by Catalina Group Limited has been detected as a potentially unwanted program by 2 anti-malware scanners. While running, it connects to the Internet address 195-154-46-150.rev.poneytelecom.eu on port 443.
Publisher:
CatalinaGroup Ltd.  (signed by Catalina Group Limited)

Product:
Citrio

Version:
50.0.2661.273

MD5:
1e06d32ea12e90de387a695e0942655f

SHA-1:
4ab189b7d92dc753bae0593d2e22eb898b92d474

SHA-256:
515caa01db54996a00a743074370e5bdeded06cb79da54c47efcec2ddfd5b3d6

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
10/23/2017 3:46:35 AM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Catalina (M)
16.9.27.8

File size:
1 MB (1,083,280 bytes)

Product version:
50.0.2661.273

Copyright:
Copyright 2015 CatalinaGroup Ltd. All rights reserved.

Original file name:
citrio.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\catalinagroup\citrio\application\citrio.exe

Digital Signature
Authority:
Starfield Technologies, Inc.

Valid from:
1/12/2015 6:36:38 PM

Valid to:
9/27/2016 8:56:54 AM

Subject:
CN=Catalina Group Limited, O=Catalina Group Limited, L=Kwun Tong, S=Hong Kong, C=HK

Issuer:
CN=Starfield Secure Certificate Authority - G2, OU=http://certs.starfieldtech.com/repository/, O="Starfield Technologies, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
1855136D47C1A483

File PE Metadata
Compilation timestamp:
9/24/2016 2:35:24 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:o/QMbgsfKBOtLL8jmA22K7dbU1vTMI8lMxi18EnsB7gb3h4M8T1R6W4DqnLLUE35:o/QsEq7zif1RqqnUxJJeX

Entry address:
0x4D0F4

Entry point:
E8, 86, 97, 00, 00, E9, 7F, FE, FF, FF, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4, F7...
 
[+]

Entropy:
5.8706

Code size:
415 KB (424,960 bytes)

Shell Open Command
Open type:
ftp

Command:
"C:\users\{user}\appdata\local\catalinagroup\citrio\application\citrio.exe" -- "%1"


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to mx-ll-110.164.6-177.static.3bb.co.th  (110.164.6.177:443)

TCP (HTTP SSL):
Connects to mx-ll-110.164.16-59.static.3bb.co.th  (110.164.16.59:443)

TCP (HTTP SSL):
Connects to mx-ll-110.164.10-114.static.3bb.co.th  (110.164.10.114:443)

TCP (HTTP):
Connects to a23-216-103-204.deploy.static.akamaitechnologies.com  (23.216.103.204:80)

TCP (HTTP SSL):
Connects to s3-1-w.amazonaws.com  (52.216.80.232:443)

TCP (HTTP SSL):
Connects to ec2-52-11-193-255.us-west-2.compute.amazonaws.com  (52.11.193.255:443)

TCP (HTTP SSL):
Connects to c0.a2.2ca9.ip4.static.sl-reverse.com  (169.44.162.192:443)

TCP (HTTP SSL):
Connects to unknown.telstraglobal.net  (202.127.76.246:443)

TCP (HTTP SSL):
Connects to host-95.alipay.com  (110.75.158.95:443)

TCP (HTTP SSL):

TCP (HTTP SSL):
Connects to a23-42-166-142.deploy.static.akamaitechnologies.com  (23.42.166.142:443)

TCP (HTTP SSL):
Connects to cache.google.com  (208.117.231.209:443)

TCP (HTTP):
Connects to 207-226-247-12.btnaccess.net  (207.226.247.12:80)

TCP (HTTP SSL):
Connects to 195-154-46-150.rev.poneytelecom.eu  (195.154.46.150:443)

Remove citrio.exe - Powered by Reason Core Security