smartbar.exe.unused

Yuna Software Limited

This is part of the Linkury/SnapDo monetization software, a web browser toolbar used to hijack a user's search in order to collect revenues. The SmartBar is a a potentially unwanted toolbar and Windows Gadget that is advertising supported (adware). The file smartbar.exe.unused by Yuna Software Limited has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address 191.33.230.184.static.adsl.gvt.net.br on port 80 using the HTTP protocol.
Publisher:
Smartbar  (signed by Yuna Software Limited)

Product:
Smartbar

Version:
1.6.1.889

MD5:
d1294c057d2b30c3a004372819d953b9

SHA-1:
d9731b05cdf171fec411660e413f89d8247139b0

SHA-256:
5ba0cc0e8545618b2e05097d58b65cbe3778873c2d24d1ae38e7b9eb0eabf82c

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/25/2024 2:04:00 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Win32.Generic
16.2.1.20

File size:
19.8 KB (20,272 bytes)

Product version:
1.6.1.889

Original file name:
Smartbar.exe

Common path:
C:\users\{user}\appdata\local\smartbar\application\smartbar.exe.unused

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
8/31/2012 7:00:00 PM

Valid to:
10/19/2015 6:59:59 PM

Subject:
CN=Yuna Software Limited, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Yuna Software Limited, L=St. Helier, S=Jersey, C=GB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
56EC82195199D735AD6E704B1B712CB5

File PE Metadata
Compilation timestamp:
3/11/2013 6:48:57 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:uVbUx3ju82wkSFy45+yVIldORoD9mVamEt92Zw3UI+ehnYPLQiQSeMVL:+bW3qMsmA97UIBhHa

Entry address:
0x4DAE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
11.5 KB (11,776 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to 201.47.158.31.static.host.gvt.net.br  (201.47.158.31:80)

TCP (HTTP):
Connects to 50.75.c0ad.ip4.static.sl-reverse.com  (173.192.117.80:80)

TCP (HTTP):
Connects to 201.47.158.45.static.host.gvt.net.br  (201.47.158.45:80)

TCP (HTTP):
Connects to 57.9d.a86c.ip4.static.sl-reverse.com  (108.168.157.87:80)

TCP (HTTP):
Connects to 201.47.158.53.static.host.gvt.net.br  (201.47.158.53:80)

TCP (HTTP):
Connects to 191.33.230.184.static.adsl.gvt.net.br  (191.33.230.184:80)

Remove smartbar.exe.unused - Powered by Reason Core Security