hdtubev1.6-codedownloader.exe

HDtubeV1.6

Motoko Group

This adware utilizes the Crossrider extension platform and will inject advertisiments in the Internet browser and may modify core browser settings. Ads will be delivered as banners and contextual text-links and may promote other potentially unwanted software. The application hdtubev1.6-codedownloader.exe by Motoko Group has been detected as adware by 13 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for HDTube extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
HDTube  (signed by Motoko Group)

Product:
HDtubeV1.6

Description:
HDtubeV1.6 exe

Version:
1000.1000.1000.1000

MD5:
3baa7a097c4547ff7d4861089a3bd623

SHA-1:
e0c184d32c50c6a912d86177f5b0ee2fb7f74c3e

SHA-256:
02dc985d8406571403369aadbc77f6ff2ac22bb92284e41257016861ab6f3377

Scanner detections:
13 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Motoko Group.

Analysis date:
4/19/2024 3:12:29 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
925

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.163.240

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1030

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.07.25.10

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-25-07_6

G Data
Gen:Variant.Adware.Kazy.374109
14.7.24

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.HDPlus.A
v2014.07.25.10

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.618

Panda Antivirus
Trj/Genetic.gen
14.07.25.10

Reason Heuristics
PUP.Crossrider.Task.Y
14.7.27.13

VIPRE Antivirus
Threat.4789396
31208

File size:
540.4 KB (553,320 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HDtubeV1.6.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hdtubev1.6\hdtubev1.6-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 6:00:00 AM

Valid to:
7/19/2015 5:59:59 AM

Subject:
CN=Motoko Group, O=Motoko Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00AAFC4F8011F7FD7C00748C990950D28A

File PE Metadata
Compilation timestamp:
7/25/2014 4:03:59 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:ZzEiz2f0n0wicY5We7jekAlKNdcpTV8oR:ZzEouWIc4OTXR

Entry address:
0x468E3

Entry point:
E8, B8, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Entropy:
6.4284

Code size:
423.5 KB (433,664 bytes)

Scheduled Task
Task name:
2fa2577e-4eca-4fc8-a6dd-42d807ffb527-1

Trigger:
Logon (Runs on logon)

Action:
hdtubev1.6-codedownloader.exe \argoaown \wfgeolqb=task \gqqslkhhf='hdtubev1.6' \


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/001731/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove hdtubev1.6-codedownloader.exe - Powered by Reason Core Security