smu.exe

W

Search Module Ltd.

The application smu.exe, “Search Module Update Service” has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Search Module Update”. While running, it connects to the Internet address server-54-230-216-182.mrs50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Search Module Ltd.

Product:
W

Description:
Search Module Update Service

Version:
2, 6, 8, 5505

MD5:
e4a69f9fc5055a78319ee184a1acab90

SHA-1:
8c70f1ccc393b0655ed6020d0a91ce4f81a66ded

SHA-256:
fe93a38a0fa430d757aa7a40eb3b13835ec538c8b95dce5d53f1b654d06fc5cb

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/23/2024 7:34:56 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Search.Toolbar (M)
17.1.24.6

File size:
1.9 MB (2,043,904 bytes)

Product version:
2, 6, 8, 5505

Copyright:
Copyright (C) 2014

Original file name:
smu.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\common files\noobzo\gnupdate\smu.exe

File PE Metadata
Compilation timestamp:
1/24/2017 12:47:54 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
14.0

Entry address:
0xD2D70

Entry point:
E8, E8, 0D, 00, 00, E9, 78, FE, FF, FF, 6A, 10, 68, 40, 6D, 5D, 00, E8, 1A, 08, 00, 00, 33, DB, 89, 5D, E0, 88, 5D, E7, 89, 5D, FC, 3B, 5D, 10, 74, 1A, 8B, 4D, 14, E8, 6C, 09, 00, 00, 8B, 4D, 08, FF, 55, 14, 8B, 45, 0C, 01, 45, 08, 43, 89, 5D, E0, EB, E1, B0, 01, 88, 45, E7, C7, 45, FC, FE, FF, FF, FF, E8, 0E, 00, 00, 00, E8, 20, 08, 00, 00, C2, 14, 00, 8B, 5D, E0, 8A, 45, E7, 84, C0, 75, 0F, FF, 75, 18, 53, FF, 75, 0C, FF, 75, 08, E8, 7B, 00, 00, 00, C3, 6A, 0C, 68, 60, 6D, 5D, 00, E8, B1, 07, 00, 00, C6...
 
[+]

Entropy:
6.5306

Code size:
1.4 MB (1,479,680 bytes)

Service
Display name:
Search Module Update

Service name:
SMUpd

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-129-105.ams50.r.cloudfront.net  (54.192.129.105:80)

TCP (HTTP):
Connects to server-54-192-55-180.jfk6.r.cloudfront.net  (54.192.55.180:80)

TCP (HTTP):
Connects to server-52-85-63-108.lhr50.r.cloudfront.net  (52.85.63.108:80)

TCP (HTTP):
Connects to server-52-85-63-175.lhr50.r.cloudfront.net  (52.85.63.175:80)

TCP (HTTP):
Connects to server-54-192-55-148.jfk6.r.cloudfront.net  (54.192.55.148:80)

TCP (HTTP):
Connects to server-52-85-63-198.lhr50.r.cloudfront.net  (52.85.63.198:80)

TCP (HTTP):
Connects to server-54-192-55-79.jfk6.r.cloudfront.net  (54.192.55.79:80)

TCP (HTTP):
Connects to server-54-192-55-178.jfk6.r.cloudfront.net  (54.192.55.178:80)

TCP (HTTP):
Connects to server-54-230-11-86.lhr3.r.cloudfront.net  (54.230.11.86:80)

TCP (HTTP):
Connects to server-54-230-11-69.lhr3.r.cloudfront.net  (54.230.11.69:80)

TCP (HTTP):
Connects to server-54-192-55-233.jfk6.r.cloudfront.net  (54.192.55.233:80)

TCP (HTTP):
Connects to server-54-192-19-147.iad12.r.cloudfront.net  (54.192.19.147:80)

TCP (HTTP):
Connects to server-54-192-159-49.sin3.r.cloudfront.net  (54.192.159.49:80)

TCP (HTTP):
Connects to server-52-85-63-147.lhr50.r.cloudfront.net  (52.85.63.147:80)

TCP (HTTP):
Connects to server-52-85-151-250.hkg51.r.cloudfront.net  (52.85.151.250:80)

TCP (HTTP):
Connects to server-52-85-151-123.hkg51.r.cloudfront.net  (52.85.151.123:80)

TCP (HTTP):
Connects to server-54-230-216-182.mrs50.r.cloudfront.net  (54.230.216.182:80)

TCP (HTTP):
Connects to server-54-230-11-222.lhr3.r.cloudfront.net  (54.230.11.222:80)

TCP (HTTP):
Connects to server-54-230-11-175.lhr3.r.cloudfront.net  (54.230.11.175:80)

TCP (HTTP):
Connects to server-54-230-11-146.lhr3.r.cloudfront.net  (54.230.11.146:80)

Remove smu.exe - Powered by Reason Core Security