defaulttabsearch.exe

The application defaulttabsearch.exe has been detected as a potentially unwanted program by 44 anti-malware scanners. It runs as a windows Service named “DefaultTabSearch”. This virus which infects .exe files stops various security software and prevents some core Windows utilities from running. It also tries to download other files from a remote server, including other malware. While running, it connects to the Internet address 94.31.29.248.IPYX-077437-ZYO.above.net on port 80 using the HTTP protocol.
MD5:
6239dd7975e92941241cabb704248a19

SHA-1:
29e0bd62651b42f04c0dbced88da4b3d79a2ab1e

SHA-256:
44c56a87ce2737919f137eed0d6853bd327cf29a477d2d0fca1379b6a2c96bce

Scanner detections:
44 / 68

Status:
Potentially unwanted

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
8/18/2018 5:24:41 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
1032

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
Win32/Kashu.E
14.04.09

Avira AntiVirus
W32/Sality.AT
7.11.138.108

Antiy Labs AVL
Virus/Win32.Sality.gen
0.1.0.1

avast!
Win32:SaliCode
2014.9-140409

AVG
Win32/Sality
2015.0.3510

Bitdefender
Win32.Sality.3
1.0.20.495

Bkav FE
W32.Sality.PE
1.3.0.4959

Boost by Reason
Optional.Service.Q
188163

CMC Antivirus
Trojan.Win32.Krap.1!O
1.1.0.977

Commtouch SDK
W32/Sality.E.gen!Eldorado
5.4.1.7

Comodo Security
Virus.Win32.Sality.Gen
17974

Dr.Web
Win32.Sector.22
9.0.1.099

Emsisoft Anti-Malware
Win32.Sality
8.14.04.09.12

ESET NOD32
Win32/Toolbar.DefaultTab (variant)
7.9255

F-Prot
W32/Sality.E.gen
v6.4.7.1.166

F-Secure
Win32.Sality.3
11.2014-09-04_4

G Data
Win32.Trojan.Agent.9ZL7HS
14.1.22

IKARUS anti.virus
Virus.Win32.Sality
t3scan.2.2.29

Jiangmin
Win32/HLLP.Kuku.Gen
KV140409

K7 AntiVirus
Virus
13.176.11524

K7 Gateway Antivirus
Virus
13.176.11524

Kaspersky
Virus.Win32.Sality
14.0.0.4045

Kingsoft AntiVirus
Win32.Sality.lx.368640
331020.49267

McAfee
W32/Sality.gen.z
5600.7166

McAfee Web Gateway
Heuristic.LooksLike.Win32.Suspicious.J!87
7.7166

Microsoft Security Essentials
Virus:Win32/Sality.AT
1.10401

MicroWorld eScan
Win32.Sality.3
15.0.0.297

NANO AntiVirus
Virus.Win32.Sality.beygb
0.28.0.58491

Norman
Sality.ZHB
11.20140409

nProtect
Win32.Sality.3
14.03.21.01

Panda Antivirus
W32/Sality.AA
14.04.09.12

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
4.14.12.00

Reason Heuristics
Threat.Win.Reputation.IMP
14.4.9.0

Sophos
Mal/Sality-D
4.98

The Hacker
W32/Sality.gen
6.8.0.4.99

Total Defense
Win32/Sality.AA
37.0.10833

Trend Micro House Call
PE_SALITY.RL
7.2.99

Trend Micro
PE_SALITY.RL
10.465.09

Vba32 AntiVirus
Virus.Win32.Sality.bakc
3.12.24.3

VIPRE Antivirus
Virus.Win32.Sality.at
27652

ViRobot
Win32.Sality.N
2011.4.7.4223

File size:
561 KB (574,464 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\defaulttab\defaulttabsearch.exe

File PE Metadata
Compilation timestamp:
12/20/2013 6:24:44 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
9.0

CTPH (ssdeep):
12288:/g8hS8mTiOQChepRSddHxVbJPDud3nxjp3/c2:oIS8m+4hCRSZPP6Vnxjq2

Entry address:
0x6025D

Entry point:
E8, 63, D7, 00, 00, E9, A5, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3...
 
[+]

Entropy:
6.6223

Code size:
483.5 KB (495,104 bytes)

Service
Display name:
DefaultTabSearch

Type:
Win32OwnProcess, InteractiveProcess


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to 94.31.29.248.IPYX-077437-ZYO.above.net  (94.31.29.248:80)

Remove defaulttabsearch.exe - Powered by Reason Core Security