Client.exe

Secureencoded

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application Client.exe by Secureencoded has been detected as adware by 7 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This executable runs as a local area network (LAN) Internet proxy server listening on port 49200 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. Additionally, the file is typically installed by a number of programs including Rockettab by Rich River Media, LLC and “RocketTab” by Adknowledge, both potentially unwanted software.
Publisher:
Secureencoded  (signed and verified)

Version:
1.0.5378.23763

MD5:
5b70d831a4b1a0c4ca51e3efc455ae30

SHA-1:
2b556914926edf818861e982fa38e9470b5a4a0b

SHA-256:
68463878185b99dd0c2b671924edb408994138e869c1f39d733074e9bc8c8ebc

Scanner detections:
7 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/21/2017 5:06:39 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
MSIL/Adware.iBryte (variant)
8.10448

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud)
331020.49267

Reason Heuristics
PUP.Secureencoded.G
14.9.30.13

VIPRE Antivirus
AdKnowledge
33340

File size:
1.4 MB (1,423,080 bytes)

Product version:
1.0.5378.23763

Original file name:
Client.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
Language Neutral

Common path:
C:\Program Files\search extensions\client.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/13/2014 8:00:00 PM

Valid to:
7/14/2015 7:59:59 PM

Subject:
CN=Secureencoded, O=Secureencoded, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
008A9DE5BF6D7E4070873AB08E9304F7FA

File PE Metadata
Compilation timestamp:
9/22/2014 10:12:24 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:hYYwEEl0n855h6JS2F7e11MJ36qKTHBs0q7+wghen:HRW6JSdLW6fvqiwgsn

Entry address:
0x151DFA

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, 00, 03, 00, 00, 00, 30, 00, 00, 80, 0E, 00, 00, 00, 84, A1, 00, 80, 10, 00, 00, 00, D4, A1, 00, 80, 18, 00, 00, 00, 84, A4, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 02, 00, 00, 00, 48, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 60, 00, 00, 00, 6C, 20, 15, 00, 18, A1, 00, 00, 00, 00, 00, 00, 28, 00, 00, 00, 64, 00, 00, 00, C8, 00, 00, 00, 01, 00...
 
[+]

Entropy:
7.0986

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1.3 MB (1,375,744 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49200/

Local host port:
49200

Default credentials:
No


The file Client.exe has been discovered within the following programs.

“RocketTab”  by Adknowledge
RocketTab is a web browser extension that injects display advertising in the user's browser. Ads are displayed in the form of banners and contextual text-links and are both injected in white space areas of the HTML page or over existing ads of the underlying web site.
85% remove it
Rockettab  by Rich River Media, LLC
RocketTab is an adware program that injects advertising in the user's web browser by creating a local proxy server and routing all Internet traffic through that proxy. By re-routing traffic the service will be able to include various ads in the HTML of the displaying web page.
rockettab.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to server-54-230-39-45.jfk1.r.cloudfront.net  (54.230.39.45:80)

TCP (HTTP):
Connects to server-54-230-38-28.jfk1.r.cloudfront.net  (54.230.38.28:80)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (54.231.14.209:80)

TCP (HTTP):
Connects to redirector2.dynect.net  (216.146.46.11:80)

TCP (HTTP):
Connects to ord08s13-in-f4.1e100.net  (173.194.46.100:80)

TCP (HTTP):
Connects to ord08s13-in-f28.1e100.net  (173.194.46.124:80)

TCP (HTTP):
Connects to ord08s13-in-f26.1e100.net  (173.194.46.122:80)

TCP (HTTP):
Connects to ord08s13-in-f25.1e100.net  (173.194.46.121:80)

TCP (HTTP SSL):
Connects to ord08s13-in-f18.1e100.net  (173.194.46.114:443)

TCP (HTTP):
Connects to ord08s13-in-f13.1e100.net  (173.194.46.109:80)

TCP (HTTP):
Connects to ord08s13-in-f12.1e100.net  (173.194.46.108:80)

TCP (HTTP):
Connects to ord08s13-in-f0.1e100.net  (173.194.46.96:80)

TCP (HTTP SSL):
Connects to msnbot-65-55-252-43.search.msn.com  (65.55.252.43:443)

TCP (HTTP SSL):
Connects to lga15s47-in-f5.1e100.net  (173.194.123.37:443)

TCP (HTTP SSL):
Connects to lga15s42-in-f2.1e100.net  (74.125.226.2:443)

TCP (HTTP):
Connects to iad23s25-in-f20.1e100.net  (173.194.121.20:80)

TCP (HTTP):
Connects to iad23s24-in-f9.1e100.net  (74.125.228.233:80)

TCP (HTTP):
Connects to iad23s24-in-f8.1e100.net  (74.125.228.232:80)

TCP (HTTP):
Connects to iad23s24-in-f7.1e100.net  (74.125.228.231:80)

Remove Client.exe - Powered by Reason Core Security