utilcaramava.exe

Caramava

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application utilcaramava.exe by Caramava has been detected as adware by 6 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update Caramava”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Caramava  (signed and verified)

Version:
1.0.5287.26975

MD5:
11670d537c820dc4ec18a689e431f4d4

SHA-1:
df23c26d77f1bbd19bdca0a792a2a07f6377af7e

SHA-256:
e43ed1aa4592a6ac1d2bffaf2ff685332c3b719745e1b53a9c0a9c68bf6d6edc

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/20/2024 12:39:40 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Carama
2015.0.3433

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14625

ESET NOD32
Win32/BrowseFox.H potentially unwanted application
7.0.302.0

Malwarebytes
PUP.Optional.Caramava.A
v2014.06.25.09

Reason Heuristics
PUP.Caramava.M
14.6.25.8

VIPRE Antivirus
Threat.4741131
29708

File size:
310.3 KB (317,728 bytes)

Product version:
1.0.5287.26975

Original file name:
Caramava.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\caramava\bin\utilcaramava.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/4/2014 1:00:00 AM

Valid to:
2/5/2015 12:59:59 AM

Subject:
CN=Caramava, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Caramava, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
00E90CD7C8459392168639C13BC804AE

File PE Metadata
Compilation timestamp:
6/23/2014 5:59:25 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:deUBn8jrOtZA01skfurmslzVuyItNCM5p7Xub9teVDD:deUBWr4A0121uJNf5x8oV

Entry address:
0x4D5EE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, D8, 02, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 50, 00, 00, 00, 5C, E0, 04, 00, 7C, 02, 00, 00, 00, 00, 00, 00, 7C, 02, 34, 00, 00, 00, 56, 00, 53, 00, 5F, 00, 56, 00, 45, 00, 52, 00...
 
[+]

Entropy:
6.0878

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
301.5 KB (308,736 bytes)

Service
Display name:
Update Caramava

Type:
Win32OwnProcess


Remove utilcaramava.exe - Powered by Reason Core Security