flashplayer_tsv4b7jv4.exe

1.3.9.0.140504.01

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application flashplayer_tsv4b7jv4.exe by ClientConnect has been detected as adware by 21 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from zbane.com and multiple other hosts. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
ClientConnect LTD  (signed and verified)

Product:
1.3.9.0.140504.01

Description:
Setup.exe

Version:
1.3.9.0

MD5:
b1638ff39af9968d67e872e957c2678a

SHA-1:
d77570e3c1549818a1555c5d78a4d932c78d6b43

SHA-256:
4d3650ed402c072308be6da3dc704131bc8435e0b5013c5605be560b11aaf447

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
4/26/2024 7:55:02 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar.Conduit
7.1.1

avast!
Win32:Adware-BRM [PUP]
2014.9-140803

AVG
Generic
2015.0.3393

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.1483

Dr.Web
Adware.Conduit.96
9.0.1.0215

ESET NOD32
Win32/Toolbar.Conduit.AB (variant)
8.9811

Fortinet FortiGate
Riskware/Toolbar_Conduit
8/3/2014

herdProtect (fuzzy)
2014.9.11.20

K7 AntiVirus
Trojan
13.182.12926

Kaspersky
not-a-virus:WebToolbar.Win32.Agent
14.0.0.3462

Malwarebytes
PUP.Optional.Conduit.A
v2014.08.03.02

McAfee
Artemis!B1638FF39AF9
5600.7049

NANO AntiVirus
Riskware.Win32.Conduit.dbqqxi
0.28.2.61148

Norman
Conduit.YH
11.20140911

Panda Antivirus
Trj/Chgt.C
14.08.03.02

Qihoo 360 Security
Win32/Virus.WebToolbar.ee9
1.0.0.1015

Reason Heuristics
PUP.Installer.ClientConnect.V
14.8.3.14

Rising Antivirus
PE:Trojan.Win32.Generic.170B113A!386601274
23.00.65.14801

Total Defense
Win32/Tnega.ALHeNWC
37.0.11096

Trend Micro House Call
TROJ_GE.4DCE9EB6
7.2.215

VIPRE Antivirus
Conduit
29294

File size:
207.2 KB (212,160 bytes)

Product version:
1.3.9.0

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
FlashPlayer.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\flashplayer_tsv4b7jv4.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/3/2014 6:00:00 PM

Valid to:
2/5/2016 5:59:59 PM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=DM4, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
201C61613E36EF7DD163280196CD80F7

File PE Metadata
Compilation timestamp:
6/9/2012 8:19:49 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:Pz+92mhAMJ/cPl3iwDaozlx/LVXHSPF0MfH:PK2mhAMJ/cPlVT7VX2

Entry address:
0xAC87

Entry point:
E8, E3, FE, FF, FF, 33, C0, 50, 50, 50, 50, E8, 9F, 30, 00, 00, C3, 56, 57, 8B, 7C, 24, 0C, 8B, F1, 8B, CF, 89, 3E, E8, 8F, AB, FF, FF, 89, 46, 08, 89, 56, 0C, 8B, 87, 24, 0C, 00, 00, 89, 46, 10, 5F, 8B, C6, 5E, C2, 04, 00, 8B, C1, 8B, 08, 8B, 50, 10, 3B, 91, 24, 0C, 00, 00, 75, 0D, 6A, 00, FF, 70, 0C, FF, 70, 08, E8, 0E, B1, FF, FF, C3, 56, 8B, F1, 8B, 06, 85, C0, 74, 07, 50, FF, 15, C4, 40, 41, 00, 83, 26, 00, 83, 66, 08, 00, 83, 66, 0C, 00, 5E, C3, 56, 8B, F1, 80, 7E, 04, 00, 75, 34, 68, F4, 44, 41, 00...
 
[+]

Entropy:
7.5167

Code size:
73 KB (74,752 bytes)

The file flashplayer_tsv4b7jv4.exe has been seen being distributed by the following 30 URLs.

http://zbane.com/.../index_v3.php?value=flash&PPD=-_-OThkOF8yMTlfMzYxOF8zNjU3X1VTXzcxLjIzMS44OC4xMjBfNWMxXzM2Njg4MV9BUFA-_-lax1CMCDufq0huW4ZBACGNna39OC1a3zFSINNzEuMjMxLjg4LjEyMCgBMMHklJ8F&CID=3132626

http://zbane.com/.../index_v3.php?value=flash&PPD=-_-ZGQ5Y18yMTlfMzYxMF8zNjQ5X1VTXzE5OS4xOTUuNTguMTJfYTI1XzI2OTMzMF9BUFA-_-nym1CLayzcGf7ejDZBACGOn31bjrvqbqZiINMTk5LjE5NS41OC4xMigBMI7i9J8F&CID=3231361

http://zbane.com/.../index_v3.php?value=flash&PPD=-_-YzIxNl8yMTlfMzYxN18zNjU2X0JSXzIwMC4yMzcuMTU2LjI5X2YxZF80MjQwX0FEUw-_-ADSYS-cb473bee-2954-11e4-9968-88f7ed46823a&CID=4802

http://zbane.com/.../index_v3.php?value=flash&PPD=-_-ZDMzNl8yMTlfMzY0N18zNjg2X0JSXzE4Ny4yNC4yMjQuMTE3XzllZF8zNzEzNDdfQVBQ-_-nym1CLrhn_u-mYOhRhACGPrvqr6Wme3oWSIOMTg3LjI0LjIyNC4xMTcoATDD7_ueBQ..&CID=2746478

http://zbane.com/.../index_v3.php?value=flash&PPD=-_-NzRiYl8yMTlfMzYxM18zNjUyX0JSXzIwMS40LjIzOC4yOV81YmJfNDE3Njc1X0FQUA-_-nym1COWK7NDJpfzhMxACGPrKn72a7K_OSiIMMjAxLjQuMjM4LjI5KAEw1cTInwU.&CID=3329490

http://zbane.com/.../index_v3.php?value=flash&PPD=-_-NjI1YV8yMTlfMzYxM18zNjUyX0JSXzE3Ny40LjE4Ni4xMTVfNzQzXzM3MTM0N19BUFA-_-nym1CI-4_sbfoYznUhACGI3ysMicyO_JPSINMTc3LjQuMTg2LjExNSgBMLvA5J4F&CID=2746478

Latest 30 of 30 download URLs

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/8485968/8507091/?mainofferId=8482534&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.5.50.8505957.01&Language=US-EN

Remove flashplayer_tsv4b7jv4.exe - Powered by Reason Core Security