dcytdownloader.exe

Goobzo LTD

The application dcytdownloader.exe by Goobzo has been detected as adware by 12 anti-malware scanners. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address server-54-230-217-99.mrs50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Goobzo LTD  (signed and verified)

Version:
1.9.0.999

MD5:
9af899c3b198dd42b7f3b003e0b6042c

SHA-1:
0fe36367cd91277aa36c094b3f95800f162d7d0e

SHA-256:
d3cb0bbc55999f4cdc427c5ab9b5d08a98b497a92a175280f8bc6ab5c104e5e2

Scanner detections:
12 / 68

Status:
Adware

Analysis date:
4/25/2024 8:30:04 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
Win-PUP/CrossRider
2014.11.01

Avira AntiVirus
ADWARE/CrossRider.Gen
7.11.182.144

avast!
Win32:Adware-BZS [PUP]
2014.9-141031

AVG
Skodna
2015.0.3304

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.141031

Dr.Web
Adware.Downware.8569
9.0.1.0304

ESET NOD32
Win32/SpeedBit (variant)
8.10651

G Data
Win32.Application.GoobZo
14.10.24

Malwarebytes
PUP.Optional.Goobzo
v2014.10.31.09

NANO AntiVirus
Riskware.Win32.Downware.dgszgo
0.28.6.62995

Reason Heuristics
PUP.Goobzo.O
14.10.31.21

VIPRE Antivirus
Goobzo
34402

File size:
1.1 MB (1,129,856 bytes)

Product version:
1.9.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\dcytdownloader.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
5/2/2013 12:00:00 AM

Valid to:
5/2/2015 11:59:59 PM

Subject:
CN=Goobzo LTD, O=Goobzo LTD, L=Haifa, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
120B25DDE57B88636AD4D97D23B99C88

File PE Metadata
Compilation timestamp:
10/31/2014 8:04:45 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:iK6Bh4Isi14tnYov6zI/0R+zBUmnDFm4gQwPijTtUWrOoRe+:9Isiuy+64VzBUmnDFm4glKPtUWqoRe+

Entry address:
0x50B66

Entry point:
E8, 37, D3, 00, 00, E9, 7F, FE, FF, FF, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 48, D7, 4C, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 70, A7, 4C, 00, 01, 0F, 82, 76, D4, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02, 74, 06, F3...
 
[+]

Entropy:
6.6488

Code size:
589 KB (603,136 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-219-136.mrs50.r.cloudfront.net  (54.230.219.136:80)

TCP (HTTP):
Connects to server-54-230-219-130.mrs50.r.cloudfront.net  (54.230.219.130:80)

TCP (HTTP):
Connects to server-54-230-217-99.mrs50.r.cloudfront.net  (54.230.217.99:80)

TCP (HTTP):
Connects to server-54-230-216-123.mrs50.r.cloudfront.net  (54.230.216.123:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.42:80)

Remove dcytdownloader.exe - Powered by Reason Core Security