utilnetcrawl.exe

Traditional Board

The application utilnetcrawl.exe by Traditional Board has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “Util NetCrawl”.
Publisher:
Traditional Board  (signed and verified)

Version:
1.0.6263.6005

MD5:
e547873f00699f0455607ae1798ada75

SHA-1:
a4478f758f4b9d7299597391600ee1e519076e81

SHA-256:
70c9fb1dfd6645f6c591b9ed10a0fb544c81b64ffc6865ecad9b03449ae40221

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
5/14/2024 10:07:04 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.2.23.13

File size:
642.7 KB (658,128 bytes)

Product version:
1.0.6263.6005

Original file name:
NetCrawl2017022311.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\netcrawl\bin\utilnetcrawl.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/6/2016 7:00:00 AM

Valid to:
6/7/2017 6:59:59 AM

Subject:
CN=Traditional Board, O=Traditional Board, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2784E3C1D18AF32B18E6EF14E2B94148

File PE Metadata
Compilation timestamp:
2/23/2017 6:20:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0xA066E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1681

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
634 KB (649,216 bytes)

Service
Display name:
Util NetCrawl

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.234.16:80)

TCP (HTTP):
Connects to a118-215.37-119.deploy.akamaitechnologies.com  (118.215.37.119:80)

TCP (HTTP):
Connects to a104-115-161-73.deploy.static.akamaitechnologies.com  (104.115.161.73:80)

Remove utilnetcrawl.exe - Powered by Reason Core Security