u1403.exe

Ultrareach Internet Corp.

The application u1403.exe by Ultrareach Internet has been detected as a potentially unwanted program by 3 anti-malware scanners. This is a setup program which is used to install the application. This executable runs as a local area network (LAN) Internet proxy server listening on port 9666 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. The file has been seen being downloaded from hamed-najafi.com. While running, it connects to the Internet address googlecom183.static.host.gvt.net.br on port 443.
Publisher:
Ultrareach Internet Corp.  (signed and verified)

MD5:
a38ffe5cab0712929005ca7ebdae63e2

SHA-1:
bd709d944c54652b0ffe9624cc39248e794be097

SHA-256:
2b152a2556f2f44b019864465e94a7f4aeac8229c6bdf435c94c119d000da846

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
4/24/2024 2:53:04 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Optional.UltrareachInternetCorp.F
14.6.28.5

Trend Micro House Call
HKTL_USUR
7.2.179

Trend Micro
HKTL_USUR
10.465.28

File size:
4.4 MB (4,650,720 bytes)

File type:
Executable application (Win32 EXE)

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
12/6/2012 1:03:59 AM

Valid to:
1/11/2016 7:04:39 PM

Subject:
CN=Ultrareach Internet Corp., O=Ultrareach Internet Corp., L=Cheyenne, S=WY, C=US

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121C51978F0ED636CA3C5B5C4D33D022C10

File PE Metadata
Compilation timestamp:
6/24/2014 12:28:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:Z2aqgFahcpIZrcBVAuVBnGEdXSI8P9Mx1zmac8KZulPTAGhNl9vG4vHe0pE4:rqgFBptPAuVBnGEdXSkW8TAkzD+0m4

Entry address:
0xA27000

Entry point:
83, EC, 04, 50, 53, E8, 01, 00, 00, 00, CC, 58, 89, C3, 40, 2D, 00, 80, 0B, 00, 2D, B7, F7, 0A, 10, 05, AC, F7, 0A, 10, 80, 3B, CC, 75, 19, C6, 03, 00, BB, 00, 10, 00, 00, 68, 56, 39, 69, 0E, 68, B8, 43, 69, 0A, 53, 50, E8, 0A, 00, 00, 00, 83, C0, 00, 89, 44, 24, 08, 5B, 58, C3, 55, 89, E5, 50, 53, 51, 56, 8B, 75, 08, 8B, 4D, 0C, C1, E9, 02, 8B, 45, 10, 8B, 5D, 14, 85, C9, 74, 0A, 31, 06, 01, 1E, 83, C6, 04, 49, EB, F2, 5E, 59, 5B, 58, C9, C2, 10, 00, 6B, 67, 1A, 45, 12, 3A, 87, AC, 17, 5A, 6B, 72, 68, 56...
 
[+]

Entropy:
7.9821  (probably packed)

Code size:
936 KB (958,464 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:9666/

Local host port:
9666

Default credentials:
No


Windows Firewall Allowed Program
Name:
C:\Documents and Settings\hamza\Bureau\u1403.exe


The file u1403.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to 242.0.178.186.static.pichincha.andinanet.net  (186.178.0.242:443)

TCP (HTTP SSL):
Connects to 251.0.178.186.static.pichincha.andinanet.net  (186.178.0.251:443)

TCP (HTTP SSL):
Connects to 217.0.178.186.static.pichincha.andinanet.net  (186.178.0.217:443)

TCP (HTTP):
Connects to any-in-2678.1e100.net  (216.239.38.120:80)

TCP (HTTP SSL):
Connects to 231.0.178.186.static.pichincha.andinanet.net  (186.178.0.231:443)

TCP (HTTP SSL):
Connects to 227.0.178.186.static.pichincha.andinanet.net  (186.178.0.227:443)

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.253.167:80)

TCP (HTTP):
Connects to corporativo.gvt.net.br  (189.59.93.187:80)

TCP (HTTP SSL):
Connects to 236.0.178.186.static.pichincha.andinanet.net  (186.178.0.236:443)

TCP (HTTP SSL):
Connects to s3-ap-southeast-1.amazonaws.com  (52.219.40.37:443)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.120.130:443)

TCP:
Connects to period-create.pearlwe.net  (130.255.163.79:34717)

TCP (HTTP SSL):
Connects to googlecom183.static.host.gvt.net.br  (187.58.66.183:443)

TCP (HTTP SSL):
Connects to ea-in-f141.1e100.net  (74.125.136.141:443)

TCP (HTTP):
Connects to 237.0.178.186.static.pichincha.andinanet.net  (186.178.0.237:80)

TCP (HTTP SSL):
Connects to 232.0.178.186.static.pichincha.andinanet.net  (186.178.0.232:443)

TCP (HTTP SSL):
Connects to 216.97.25-52.static.dal01.corespace.com  (216.97.25.52:443)

TCP (HTTP SSL):
Connects to 216.0.178.186.static.pichincha.andinanet.net  (186.178.0.216:443)

Remove u1403.exe - Powered by Reason Core Security