re-markitoe171.exe

The application re-markitoe171.exe has been detected as adware by 13 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Re-markit”. This executable runs as a local area network (LAN) Internet proxy server listening on port 14286 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. This is part of the Revizer line of web browser extensions that inject 3rd-party advertisements in the user's web browser as well as setup a proxy server for the browser in order to track behaviors and display context based-ads from various partners (mostly adware).
MD5:
cebdcecc580403b6bc386bdce8c24298

SHA-1:
a4d07c76f3734ff51622e250ac09545ee578e4a2

SHA-256:
d1291c981da633d046e9df7f39350ee395be7d60000b69256030455edc7cf695

Scanner detections:
13 / 68

Status:
Adware

Analysis date:
4/25/2024 6:18:46 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.652893
873

avast!
Win32:Adware-BQV [PUP]
2014.9-140915

Baidu Antivirus
Adware.Win32.AddLyrics
4.0.3.14915

Bitdefender
Application.Generic.652893
1.0.20.1290

Comodo Security
ApplicUnwnt
18630

ESET NOD32
Win32/AdWare.AddLyrics.AN (variant)
8.9852

F-Secure
Application.Generic.652893
11.2014-15-09_2

G Data
Application.Generic.652893
14.9.24

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Agent
14.0.0.3248

MicroWorld eScan
Application.Generic.652893
15.0.0.774

Reason Heuristics
Adware.Revizer.Remarkit.Service.O
14.8.13.22

Trend Micro House Call
TROJ_GEN.F47V0609
7.2.258

File size:
176 KB (180,224 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\re-markit-soft\re-markitoe171.exe

File PE Metadata
Compilation timestamp:
5/22/2014 2:09:52 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

CTPH (ssdeep):
3072:ZRb0dLqy+5ksj9gS+r4x4bOnAH/0StBe9siZL:ZRb0Yv9LXESAHcee2iZ

Entry address:
0xE193

Entry point:
E8, 70, 66, 00, 00, E9, 7B, FE, FF, FF, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, A4, 3C, 42, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 10, 2E, 42, 00, 01, 0F, 82, 5B, 67, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02...
 
[+]

Entropy:
6.3955

Code size:
95.5 KB (97,792 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:14286/

Local host port:
14286

Default credentials:
No


Service
Display name:
Re-markit

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-90-77.ind6.r.cloudfront.net  (54.230.90.77:80)

TCP (HTTP):
Connects to server-54-230-54-253.jfk6.r.cloudfront.net  (54.230.54.253:80)

TCP (HTTP):
Connects to server-54-230-15-29.ams1.r.cloudfront.net  (54.230.15.29:80)

TCP (HTTP):
Connects to li495-133.members.linode.com  (50.116.30.133:80)

TCP (HTTP SSL):
Connects to euw0300256-pip.eu.verio.net  (213.198.84.132:443)

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP):
Connects to a24-220-183-42.deploy.akamaitechnologies.com  (24.220.183.42:80)

TCP (HTTP SSL):
Connects to a23-209-162-101.deploy.static.akamaitechnologies.com  (23.209.162.101:443)

TCP (HTTP):
Connects to a23-197-49-231.deploy.static.akamaitechnologies.com  (23.197.49.231:80)

TCP (HTTP):
Connects to 74.86.127.204-static.reverse.softlayer.com  (74.86.127.204:80)

Remove re-markitoe171.exe - Powered by Reason Core Security