dcytdownloader.exe

The application dcytdownloader.exe has been detected as a potentially unwanted program by 17 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler. While running, it connects to the Internet address server-205-251-251-121.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Version:
2.9.0.999

MD5:
0246a883b348695620801004d40ab74b

SHA-1:
947372fd2e160d267878bfc0319884b354c51c94

SHA-256:
0cafb1767bbce66c2b319b6c828817fb9344a15c085454a183af97c259367e45

Scanner detections:
17 / 68

Status:
Potentially unwanted

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/18/2024 4:07:20 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.137865
528

AhnLab V3 Security
PUP/Win32.CrossRider
2015.07.28

Avira AntiVirus
ADWARE/Adware.Gen7
8.3.1.6

Arcabit
Trojan.Zusy.D21A89
1.0.0.425

avast!
Win32:Adware-gen [Adw]
2014.9-150825

Baidu Antivirus
Adware.Win32.SpeedBit
4.0.3.15825

Bitdefender
Gen:Variant.Zusy.137865
1.0.20.1185

Dr.Web
Adware.Downware.8569
9.0.1.0237

Emsisoft Anti-Malware
Gen:Variant.Zusy.137865
8.15.08.25.10

ESET NOD32
Win32/SpeedBit.E potentially unwanted (variant)
9.12003

F-Secure
Gen:Variant.Zusy.137865
11.2015-25-08_3

G Data
Gen:Variant.Zusy.137865
15.8.25

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.1525

MicroWorld eScan
Gen:Variant.Zusy.137865
16.0.0.711

Panda Antivirus
Trj/Genetic.gen
15.08.25.10

Reason Heuristics
Threat.Win.Reputation.IMP
15.7.27.21

Rising Antivirus
PE:Trojan.Win32.Generic.18E657BB!417748923
23.00.65.15823

File size:
1.4 MB (1,444,352 bytes)

Product version:
2.9.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\installer\install_8708\dcytdownloader.exe

File PE Metadata
Compilation timestamp:
7/27/2015 3:30:59 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:Q0X3/QPKbQt8lvx5l0Chgj44QpgaaKXMNbWugxKz5nUn6o9XxQQaPDZSANtbijTL:aP/t8hDgjTaaKwV5UPQQaPDZS8t2PtL1

Entry address:
0x951D8

Entry point:
E8, 0D, E0, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 98, C9, 51, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 80, 97, 51, 00, 01, 0F, 82, 3E, E1, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0...
 
[+]

Entropy:
6.4735

Code size:
858.5 KB (879,104 bytes)

Scheduled Task
Task name:
Inst_Rep

Trigger:
Registration (Runs on registration)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-205-251-251-125.jfk5.r.cloudfront.net  (205.251.251.125:80)

TCP (HTTP):
Connects to server-205-251-251-121.jfk5.r.cloudfront.net  (205.251.251.121:80)

Remove dcytdownloader.exe - Powered by Reason Core Security