f3074e2a-b970-49c5-9c03-c410986d50d6.exe

Clara

CLARALABSOFTWARE

The application f3074e2a-b970-49c5-9c03-c410986d50d6.exe by CLARALABSOFTWARE has been detected as a potentially unwanted program by 8 anti-malware scanners. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from cdn.airdlr4.com and multiple other hosts.
Publisher:
ClaraLabs  (signed by CLARALABSOFTWARE)

Product:
Clara

Description:
ClaraSetup

Version:
2.18.3.1

MD5:
e0a27fe398f78fa73f65684aa1f1bdd4

SHA-1:
d3f9187eb37b766dae2c013853c1284523106674

SHA-256:
ff99fb3d52848b1c9309d049e45df228765efdb848243bad08351b70b9ec396b

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 10:24:13 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Searcher.2835
9.0.1.0139

Malwarebytes
PUP.Optional.Clara.A
v2015.05.19.05

McAfee
Artemis!E0A27FE398F7
5600.6760

Panda Antivirus
PUP/Clara
15.05.19.05

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.CLARALABSOFTWARE
15.5.19.13

Trend Micro House Call
Suspicious_GEN.F47V0507
7.2.139

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.3

File size:
876.6 KB (897,656 bytes)

Product version:
2.18.3.1

Copyright:
(c) Clara Labs. All rights reserved.

Original file name:
Setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\f3074e2a-b970-49c5-9c03-c410986d50d6.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
7/29/2014 9:13:08 AM

Valid to:
7/30/2015 9:13:08 AM

Subject:
CN=CLARALABSOFTWARE, O=CLARALABSOFTWARE, L=Paris, C=FR

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121E6E5C72C946A5248674AB7B56E24B246

File PE Metadata
Compilation timestamp:
4/29/2015 7:58:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:2AcEUqoklYiSonpw1iuZ5rfjXVoBGbhy5sO63BRDRd:2AFTYhonkxxho8ty5sdRdd

Entry address:
0x2355E

Entry point:
E8, BC, DC, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, FC, 45, 45, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 04, 26, 45, 00, 01, 0F, 82, 56, DD, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83...
 
[+]

Entropy:
5.8775

Code size:
249.5 KB (255,488 bytes)

The file f3074e2a-b970-49c5-9c03-c410986d50d6.exe has been seen being distributed by the following 23 URLs.

http://cdn.airdlr4.com/downloads/offers/.../Bob.exe

http://ny.offers.multiinstall.com/28b7759ef6c1e77e67aa1e42202f6cab6c8a5bfdddfb59f24e4c17da9122aa5c.exe

http://185.13.36.90/update/.../Bob.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-75-101-140-121.compute-1.amazonaws.com  (75.101.140.121:80)

TCP (HTTP):
Connects to ec2-54-225-180-128.compute-1.amazonaws.com  (54.225.180.128:80)

Remove f3074e2a-b970-49c5-9c03-c410986d50d6.exe - Powered by Reason Core Security