spd.exe

Savepath Deals

The application spd.exe by Savepath Deals has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This executable runs as a local area network (LAN) Internet proxy server listening on port 8000 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host.
Publisher:
Savepath Deals  (signed and verified)

MD5:
e45a971b1bf0d14cb5b7180a31227f8d

SHA-1:
841d9c359ac64477536f0f4df86f0b3fdf34fb02

SHA-256:
bb46a253f42abc2fc36ebeda53334a00e136183e68ce2df599c9e15ac75c324a

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/27/2024 2:14:54 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.SavepathDeals.D
14.10.16.13

File size:
2.1 MB (2,175,240 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\spd\bin\spd.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
6/9/2014 8:00:00 PM

Valid to:
6/9/2016 7:59:59 PM

Subject:
CN=Savepath Deals, O=Savepath Deals, STREET=8923 W Sunset blvd, L=West Hollywood, S=CA, PostalCode=90069, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
56EA9CE76728F55E8F87B7F0683773B7

File PE Metadata
Compilation timestamp:
10/9/2014 1:45:50 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
49152:LEACjfFUU/TIyS3oSRM0xVXCWq7PSGp/h5TMo6IA8BopPOl002u4:5IfmUrIyioSpxdCND3CV

Entry address:
0x13032E

Entry point:
E8, 9A, 33, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 51, 51, 8D, 45, F8, 50, FF, 15, 9C, A0, 57, 00, 8B, 4D, F8, 8B, 45, FC, 81, C1, 00, 80, C1, 2A, 6A, 00, 68, 80, 96, 98, 00, 15, 21, 4E, 62, FE, 50, 51, E8, DA, 28, 00, 00, 85, D2, 7C, 0F, 7F, 07, 3D, 7F, D2, FF, 7F, 76, 06, 83, C8, FF, 89, 45, FC, 8B, 4D, 08, 85, C9, 74, 02, 89, 01, 8B, E5, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03...
 
[+]

Entropy:
6.7264

Code size:
1.5 MB (1,544,192 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:8000/

Local host port:
8000

Default credentials:
No


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP SSL):
Connects to pc-in-f141.1e100.net  (74.125.28.141:443)

TCP (HTTP SSL):
Connects to ord08s11-in-f27.1e100.net  (173.194.46.91:443)

TCP (HTTP SSL):
Connects to ord08s11-in-f15.1e100.net  (173.194.46.79:443)

TCP (HTTP SSL):
Connects to nuq05s02-in-f22.1e100.net  (74.125.239.150:443)

TCP (HTTP SSL):
Connects to nuq05s01-in-f3.1e100.net  (74.125.239.99:443)

TCP (HTTP SSL):
Connects to lb5-www-code.vivox.com  (64.94.253.154:443)

TCP (HTTP SSL):
Connects to lax02s19-in-f7.1e100.net  (74.125.224.103:443)

TCP (HTTP):
Connects to float.2471.bm-impbus.prod.nym2.adnexus.net  (68.67.176.55:80)

TCP (HTTP):
Connects to float.2397.bm-impbus.prod.lax1.adnexus.net  (68.67.129.56:80)

TCP (HTTP):
Connects to ec2-54-236-177-211.compute-1.amazonaws.com  (54.236.177.211:80)

TCP (HTTP):
Connects to den03s06-in-f26.1e100.net  (74.125.225.218:80)

TCP (HTTP SSL):
Connects to channel-proxy-shv-06-ash2.facebook.com  (173.252.102.24:443)

TCP (HTTP):
Connects to a96-17-15-72.deploy.akamaitechnologies.com  (96.17.15.72:80)

TCP (HTTP):
Connects to a96-17-15-58.deploy.akamaitechnologies.com  (96.17.15.58:80)

TCP (HTTP SSL):
Connects to a23-5-92-192.deploy.static.akamaitechnologies.com  (23.5.92.192:443)

TCP (HTTP):
Connects to 74-202-215-34.static.twtelecom.net  (74.202.215.34:80)

Remove spd.exe - Powered by Reason Core Security