SuperSocket.ClientEngine.Core.dll

SuperSocket ClientEngine

Sara Kodama Project

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The module SuperSocket.ClientEngine.Core.dll, “SuperSocket.ClientEngine.Core for .NET 2.0” by Sara Kodama Project has been detected as adware by 17 anti-malware scanners. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
SuperSocket  (signed by Sara Kodama Project)

Product:
SuperSocket ClientEngine

Description:
SuperSocket.ClientEngine.Core for .NET 2.0

Version:
0.3.0.0

MD5:
0c32390ee5de974197a840f7b041b320

SHA-1:
4b2e5975992a12a3a7f621af351572156c530ab1

SHA-256:
d9ae95e333f95493e57ab84c1accbfc98461f3477dfd6ac9ff09788d73f8386b

Scanner detections:
17 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/26/2024 9:39:45 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen7
7.11.189.70

AVG
Generic
2015.0.3277

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.141128

Clam AntiVirus
Win.Trojan.Googupdate-11
0.98/21511

ESET NOD32
Win32/Toolbar.CrossRider.BM (variant)
8.10750

K7 AntiVirus
Unwanted-Program
13.185.14071

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.2879

McAfee
Artemis!0C32390EE5DE
5600.6933

NANO AntiVirus
Trojan.Win32.GoogUpdate.djdgga
0.28.6.63474

nProtect
Trojan-Clicker/W32.Agent.26528
14.11.27.01

Panda Antivirus
Trj/Chgt.L
14.11.28.04

Qihoo 360 Security
HEUR/QVM23.0.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.SaraKodamaProject.BB
14.11.28.4

Sophos
Generic PUA EL
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-GoogUpdate
10211

Trend Micro House Call
Suspicious_GEN.F47V1115
7.2.332

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

File size:
25.9 KB (26,528 bytes)

Product version:
0.3.0.0

Copyright:
Copyright © clientengine.codeplex.com 2012

Original file name:
SuperSocket.ClientEngine.Core.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\app lid\supersocket.clientengine.core.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
10/20/2014 3:30:00 AM

Valid to:
10/21/2015 3:29:59 AM

Subject:
CN=Sara Kodama Project, O=Sara Kodama Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
75E47031A737D2A200F0C7A94034399F

File PE Metadata
Compilation timestamp:
4/11/2014 6:52:22 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:ju27nH/DYYxTFBA5Wuj6LV466g8qtBYo1g8l8k1:jdhxTFBAkuugXC

Entry address:
0x6A2E

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.7674

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
19 KB (19,456 bytes)

Remove SuperSocket.ClientEngine.Core.dll - Powered by Reason Core Security