secure.letigerfastcdn.com

Domains By Proxy, LLC  (Proxy Registrant)

Domain Information

The domain secure.letigerfastcdn.com is registered by proxy through GODADDY.COM, LLC and was originally registered in December of 2013. This domain has been known to host and distribute adware as well as other potentially unwanted software. The hosted servers are located in San Jose, California within the United States which resides on the CDNetworks Inc. network.
Registrar:
GODADDY.COM, LLC

Server location:
California, United States (US)

Create date:
Wednesday, December 4, 2013

Expires date:
Thursday, December 4, 2014

Updated date:
Wednesday, December 4, 2013

ASN:
AS36408 CDNETWORKSUS-02 - CDNetworks Inc.,US

Root domain:

Scanner detections:
Detections  (97% detected)

Scan engine
Details
Detections

Rising Antivirus
PE:Trojan.Win32.Generic.13FF7F71!335511409, NS:PUF.SilenceInstaller!1.9DDF, PE:Trojan.Win32.Generic.16F9B8E1!385464545
76.92%

McAfee
Artemis!C6CB73697362, OneInstaller, Artemis!D941EF050346, Artemis!07363E8279EC, RDN/Generic PUP.x!chk, RDN/Generic PUP.z!ec, Artemis!787D8A30B176, Artemis!9A3C28A2966B, Artemis!C37003A04EA8, Artemis!96078ABFD661, Artemis!A7153AED0050, Adware-Monetizer, Artemis!BD30980654C7, RDN/Downloader.a!ry, Artemis!A08A49C4ACBD
74.36%

Dr.Web
Adware.Downware.1243, Trojan.MulDrop4.22250, Program.Unwanted.40, Adware.Downware.918, Threat.Undefined, Adware.Downware.4473
66.67%

ESET NOD32
Win32/InstallMonetizer.AG, MSIL/AdvancedSystemProtector (variant), Win32/InstallMonetizer.AZ, Win32/InstallMonetizer.BB
66.67%

Trend Micro House Call
Suspicious_GEN.F47V0610, Suspicious_GEN.F47V0625, TROJ_GEN.R047H06G314, TROJ_GEN.R047H06G214, TROJ_GEN.R0CBH06G414, TROJ_GEN.R047H06G914
66.67%

Malwarebytes
PUP.Optional.InstallMonetizer.NS, PUP.Optional.SilenceInstaller.A, PUP.Optional.Installcore
64.10%

avast!
NSIS:Downloader-ZK [PUP], Win32:Malware-gen, Win32:Adware-gen [Adw], InstMonetizer-BC [PUP], NSIS:Adware-OI [PUP], NSIS:InstMonetizer-BC [PUP]
53.85%

Baidu Antivirus
Trojan.MSIL.AdvancedSystemProtector, Adware.Win32.InstallMonetizer, Adware.Win32.InstallCore, PUA.Win32.VMDetector
51.28%

NANO AntiVirus
Trojan.Win32.MulDrop4.cfecrq, Trojan.Nsis.OneInstaller.dbpzbw, Riskware.Win32.MLW.ddylkr
46.15%

VIPRE Antivirus
InstallMonetizer, Trojan.Win32.Generic, Threat.4150696, Adware.Monetizer
46.15%

IKARUS anti.virus
AdWare.Win32.InstallMonetizer
43.59%

Reason Heuristics
PUP.Installer.BrowserDistributionServices.V, PUP.Installer.Applon.Y, PUP.Yawtix.G, PUP.StartInstall., PUP.StartInstall.Y, PUP.InstallManager.Meta (M), PUP.GameVicio.Installer.Meta (M)
41.03%

Sophos
Generic Bundleware, Generic PUA DP, Generic PUA PN, Generic PUA AM, Generic PUA FG, Generic PUA LM, AppMonetizer Installer
28.21%

AVG
MultiBundle.D, Generic, AdInstaller
23.08%

Avira AntiVirus
TR/Mitglieder.1440907, APPL/Downloader.Gen
15.38%

The domain secure.letigerfastcdn.com has been seen to resolve to the following 9 IP addresses.

October 24, 2014

October 24, 2014

September 5, 2014

September 4, 2014

September 4, 2014

September 4, 2014

September 4, 2014

September 4, 2014

September 4, 2014

File downloads found at URLs served by secure.letigerfastcdn.com.

11 / 68    (PUP)

8 / 68      (PUP)

14 / 68    (PUP)

16 / 68    (PUP)

4 / 68      (inconclusive)
http://secure.letigerfastcdn.com/.../rcpsetup_17970HD.exe  (2d6ce916b05eb234b37563f64c324554)

10 / 68    (PUP)

11 / 68    (Malware)

1 / 68      (PUP)

4 / 68      (Adware)
http://secure.letigerfastcdn.com/.../Yawtix.exe  (8fab6fdb4b65375d6890ed097c49e46b)

19 / 68    (PUP)

21 / 68    (PUP)

10 / 68    (PUP)

3 / 68      (PUP)

2 / 68      (Adware)

14 / 68    (PUP)

1 / 68      (Adware)

10 / 68    (Adware)

The following 37 files have been seen to comunicate with secure.letigerfastcdn.com in live environments.

 
Latest 20 of 156 files

URL:
http://secure.letigerfastcdn.com/

Web server:
PWS/8.1.20