hd-v1.9-codedownloader.exe

HD-V1.9

Motoko Group

This adware utilizes the Crossrider extension platform and will inject advertisiments in the Internet browser and may modify core browser settings. Ads will be delivered as banners and contextual text-links and may promote other potentially unwanted software. The application hd-v1.9-codedownloader.exe by Motoko Group has been detected as adware by 41 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for InfoHD-V1.8 extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
InfoHD-V1.8  (signed by Motoko Group)

Product:
HD-V1.9

Description:
HD-V1.9 exe

Version:
1000.1000.1000.1000

MD5:
9724eb59bc08b67420e369a314da1205

SHA-1:
b92833b6b63a4c47581e68b64451b5574d699e35

SHA-256:
e7b24ae5c4244151684c2e5637bfcde1789fcf0364fefa43176c421b8fb3a8c3

Scanner detections:
41 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Motoko Group.

Analysis date:
4/19/2024 8:14:17 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
922

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
PUP/Win32.PlusHD
2014.07.23

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.164.52

avast!
Win32:SaliCode
2014.9-140728

AVG
Generic
2015.0.3400

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14728

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1045

Bkav FE
W32.Sality.PE
1.3.0.4959

Clam AntiVirus
Win.Adware.Agent-7332
0.98/19185

Comodo Security
Virus.Win32.Sality.Gen
18804

Dr.Web
Win32.Sector.22
9.0.1.0209

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.07.28.01

ESET NOD32
Win32/Toolbar.CrossRider.AG (variant)
8.10161

Fortinet FortiGate
Riskware/Toolbar_CrossRider
7/28/2014

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-28-07_2

G Data
Gen:Variant.Adware.Kazy.374109
14.7.24

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.180.12643

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.3495

Malwarebytes
PUP.Optional.InfoHD.A
v2014.07.28.01

McAfee
Artemis!9724EB59BC08
5600.7056

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.627

NANO AntiVirus
Riskware.Win32.AdLoad.dbdvli
0.28.2.60990

Norman
Sality.ZHB
11.20140728

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
Trj/Genetic.gen
14.07.28.01

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
7.14.14.00

Reason Heuristics
PUP.Crossrider.MotokoGroup.V
14.7.28.1

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14726

Sophos
Generic PUA LJ
4.98

Total Defense
Win32/Sality.AA
37.0.11046

Trend Micro House Call
PE_SALITY.RL
7.2.209

Trend Micro
PE_SALITY.RL
10.465.28

Vba32 AntiVirus
AdWare.AdLoad
3.12.26.3

VIPRE Antivirus
Crossrider
31668

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1850

File size:
546.9 KB (559,976 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V1.9.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\hd-v1.9\hd-v1.9-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 1:00:00 AM

Valid to:
7/19/2015 12:59:59 AM

Subject:
CN=Motoko Group, O=Motoko Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00AAFC4F8011F7FD7C00748C990950D28A

File PE Metadata
Compilation timestamp:
7/26/2014 11:04:12 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:cSR7K3ek6g0yQQiZMBXjlNmfMf/yc3yB0pJMRje2vqguHgOUNqMpWNVy9pTB3iv/:cU2Ok1iZjMbCS2vq5AOUsFNVy9pTJY

Entry address:
0x47213

Entry point:
E8, B8, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Code size:
429 KB (439,296 bytes)

Scheduled Task
Task name:
01a193aa-0c4a-42fa-adfa-fe014188f8de-1

Trigger:
Logon (Runs on logon)

Action:
hd-v1.9-codedownloader.exe \nkyphlky \ebaoudgr=task \pywtkvx='hd-v1.9' \lteeu


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/002683/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove hd-v1.9-codedownloader.exe - Powered by Reason Core Security