WebSocket4Net.dll

King Gainer Lab

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The module WebSocket4Net.dll, “WebSocket4Net for .NET 2.0” by King Gainer Lab has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
WebSocket4Net  (signed by King Gainer Lab)

Product:
WebSocket4Net

Description:
WebSocket4Net for .NET 2.0

Version:
0.9.0.0

MD5:
a3c0d1964c4b91562e8f7b28d205b8cd

SHA-1:
12412c00a11b480200647115b7a9ae0624c2f52c

SHA-256:
cfb920596136ddcdab217f86a3cf068b9934a930a2076941306161ac1a9b91bb

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
10/24/2020 7:41:26 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcicrle (M)
16.9.19.6

File size:
62.9 KB (64,408 bytes)

Product version:
0.9.0.0

Copyright:
Copyright © websocket4net.codeplex.com 2012

Original file name:
WebSocket4Net.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\theveehd plugin v10\websocket4net.dll

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/19/2014 5:30:00 AM

Valid to:
8/20/2015 5:29:59 AM

Subject:
CN=King Gainer Lab, O=King Gainer Lab, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
10B5049C2559348D7A87203A148C790A

File PE Metadata
Compilation timestamp:
5/26/2014 6:43:38 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:frKEBvRG7IE/kWkMm+kDjHz66x8ljDAMIonIg7T6Xc:frXBv07cEm+knHz66iljDAMIonIg7T+c

Entry address:
0xFFCE

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 10, 00, 00, 00, 18, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 30, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 48, 00, 00, 00, 58, 00, 01, 00, AC, 03...
 
[+]

Entropy:
5.8771

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
56 KB (57,344 bytes)

Remove WebSocket4Net.dll - Powered by Reason Core Security