Adware.Sogou
위협 스코어카드
EnigmaSoft 위협 스코어카드
EnigmaSoft Threat Scorecard는 당사 연구팀이 수집 및 분석한 다양한 악성코드 위협에 대한 평가 보고서입니다. EnigmaSoft Threat Scorecard는 실제 및 잠재적 위험 요인, 추세, 빈도, 확산 및 지속성을 포함한 여러 메트릭을 사용하여 위협을 평가하고 순위를 지정합니다. EnigmaSoft Threat Scorecard는 당사의 연구 데이터 및 메트릭을 기반으로 정기적으로 업데이트되며 시스템에서 맬웨어를 제거하기 위한 솔루션을 찾는 최종 사용자부터 위협을 분석하는 보안 전문가에 이르기까지 광범위한 컴퓨터 사용자에게 유용합니다.
EnigmaSoft Threat Scorecard는 다음과 같은 다양한 유용한 정보를 표시합니다.
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
심각도 수준: 위협 평가 기준 에 설명된 대로 위험 모델링 프로세스 및 연구를 기반으로 숫자로 표시된 개체의 결정된 심각도 수준입니다.
감염된 컴퓨터: SpyHunter에서 보고한 감염된 컴퓨터에서 탐지된 특정 위협의 확인 및 의심 사례 수입니다.
위협 평가 기준 도 참조하십시오.
| Popularity Rank: | 3,673 |
| 위협 수준: | 80 % (높은) |
| 감염된 컴퓨터: | 32,499 |
| 처음 본 것: | November 20, 2015 |
| 마지막으로 본: | January 25, 2026 |
| 영향을 받는 OS: | Windows |
Adware.Sogou는 잠재적으로 원치 않는 광고 프로그램입니다. Adware.Sogou는 시스템에 몰래 설치될 수 있으며 종종 트로이 목마와 같은 맬웨어와 함께 번들로 제공됩니다. Adware.Sogou는 Internet Explorer 홈 페이지 또는 검색 페이지를 수정하여 팝업, 배너 또는 링크의 형태로 광고를 표시할 수 있습니다.
목차
SpyHunter는 Adware.Sogou를 감지하고 제거합니다.
파일 시스템 세부 정보
| # | 파일 이름 | MD5 |
탐지
탐지: SpyHunter에서 보고한 감염된 컴퓨터에서 탐지된 특정 위협의 확인 및 의심 사례 수입니다.
|
|---|---|---|---|
| 1. | bdupdate.exe | 3be0e8890a088580ff6840940d1d0988 | 104 |
| 2. | tools_update.exe | b18a0019f427178286ae667dbc350469 | 9 |
| 3. | %ProgramFiles%\Common Files\Sogou PXP\p2psvr.exe | ||
| 4. | %ProgramFiles%\P4P\p4pipc.dll | ||
| 5. | %ProgramFiles%\P4P\SoDALib.dll |
레지스트리 세부 정보
디렉토리
Adware.Sogou는 다음 디렉토리를 만들 수 있습니다.
| %PROGRAMFILES%\tools\update |
| %PROGRAMFILES(x86)%\tools\update |
분석 보고서
일반 정보
| Family Name: | Trojan.Sogou |
|---|---|
| Signature status: | Hash Mismatch |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
b06a18fd2f9acb3b3fc9f32b3ae2852a
SHA1:
c59366ed5c8e1b47f64af03c870793104afba75d
파일 크기:
203.90 KB, 203904 bytes
|
|
MD5:
76a87cc9960bce8a5eca578d26cedb29
SHA1:
b594dca4b75301d6e52033ffc7b49d1bdf626fe1
파일 크기:
9.52 MB, 9517720 bytes
|
|
MD5:
a20348f065f642f03c1912fbf586196e
SHA1:
b813f3e662fafe5fba9933d28a993bc39bde894e
SHA256:
8BB883C65FC0339FBE0BE370E3AA7D5102EEC6BC823609DDD90A9A590A03D7EB
파일 크기:
1.95 MB, 1946600 bytes
|
|
MD5:
70b868cb848faaccdd470676e5ea2536
SHA1:
693407e313df2e68904b6b88bd9e44899f2f5149
SHA256:
E27068DEF6897F7AB202EA541560F717540AB9AD72C73C699D6A33C8CBDF8C00
파일 크기:
545.73 KB, 545728 bytes
|
|
MD5:
ae39c7b386b372c9a1bf1ed57c3a360f
SHA1:
fb99c99c5b159c1b6658d58a279c1b5d7f09fea9
SHA256:
AC7D8ED76116F01904C812A416AD968A970D1F75BF66503679CD826C998080DF
파일 크기:
1.48 MB, 1480768 bytes
|
Show More
|
MD5:
cbcc292ee264028646aac724d9b9c9a0
SHA1:
d635e2aec646d1cf2355d7e05f70f8e9bc6f123f
SHA256:
7A23721779E84873A1EF9ADD789B754EEA00F90A180A4C831410C6F0339B26FF
파일 크기:
46.26 KB, 46264 bytes
|
|
MD5:
ca78f15a4ca31fd56fb07893b80d0b8e
SHA1:
7df80c26b5eb291e0cb248503f379c2bfbbb7568
SHA256:
6B94735D4076F9CE930E8ED8995EEF85152AB553CDA03EA28297F854434E2121
파일 크기:
1.95 MB, 1946544 bytes
|
|
MD5:
f352c6eae6613183221cf9d24fbad06c
SHA1:
097317ab43c15d67ae5a4b68ba083e8d8a68869c
SHA256:
9040FDF54B462797755A05BAFD378AF3AD38E28D663C80C2F873F48DBAD7F384
파일 크기:
470.12 KB, 470120 bytes
|
|
MD5:
b6ab761a2941bcaadc23bcef8f7b4060
SHA1:
3dba655fd506fabab8ccd642d21a97d58934231c
SHA256:
267187B1247E5F4C4B9A76E57DEA47FC619DE444AA56EDA91CB731017235C5F7
파일 크기:
462.45 KB, 462448 bytes
|
|
MD5:
89403c88a438fd262b889ca8d84eb39a
SHA1:
a83f23ff4fadbf1172d1d9061130613152e4990c
SHA256:
4CCEE1C442AF9D5759DA5FE62A82907602518BE29DCB9908A4E760371A47EA7B
파일 크기:
551.29 KB, 551288 bytes
|
|
MD5:
e46759dd45ad2a419e22e879394d5187
SHA1:
c425e4f20dd8c34047c13e9fa24adbd5ca4d4ed0
SHA256:
6D1517C9ABEBA196E1273A5015D1E539D663A0B4AAD28D52548516DB20A7B2CB
파일 크기:
1.95 MB, 1946584 bytes
|
|
MD5:
b9f69d30bf1dcd784751c70f3183ac6a
SHA1:
5f1f561509374902c5630f4a1969f24335d13da7
SHA256:
D469EC7B7D15C5792B41EC59104FC7555F04C31E2BF489CDB3E5C7E78B3B9479
파일 크기:
1.61 MB, 1612288 bytes
|
|
MD5:
c25b2a407eeec50bf55fd0ada0e091e3
SHA1:
fe594cf2a0e0a75f13451467ec01f6fc9f1ba991
SHA256:
AFBAE459621D8D1FE7EF21FD5394B5FD286C1AA29643BD8DD5C0BCCDBBE25B8E
파일 크기:
579.69 KB, 579688 bytes
|
|
MD5:
6bbf07a9c75e0be6dab3b846542a98c1
SHA1:
3a4fb56e9bdd4e2269fc7d2bf8fd0acce8866651
SHA256:
2D80D0B1D139B8533257CCC02D887D5755ADB93E2C368CCD02C58648C422D7FF
파일 크기:
1.95 MB, 1946544 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
Show More
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| 이름 | 값 |
|---|---|
| Company Name | Sogou.com Inc. |
| File Description |
|
| File Version |
Show More
|
| Internal Name |
|
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Sogou.com | Class 3 Public Primary Certification Authority | Root Not Trusted |
| Beijing Sogou Technology Development Co., Ltd. | DigiCert SHA2 Assured ID Code Signing CA | Hash Mismatch |
| Sogou.com | Symantec Class 3 SHA256 Code Signing CA | Self Signed |
| Beijing Sogou Technology Development Co., Ltd. | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Sogou.com | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
File Traits
- HighEntropy
- Installer Version
- x64
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 5,138 |
|---|---|
| Potentially Malicious Blocks: | 18 |
| Whitelisted Blocks: | 4,042 |
| Unknown Blocks: | 1,078 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe\sgdownloadpipenew2 | Generic Read,Write Data,Write Attributes,Write extended,Append data,LEFT 786432 |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | 데이터 | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | ⠍ ȁ ⋡ 龡^ Ū 紘Çó 獖}Ŵ ⦘· Ŵ 좟Êh , ֢ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 꿤 ȁ 獖} | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Syscall Use |
Show More
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Anti Debug |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
open C:\WINDOWS\system32\regsvr32.exe /s C:\WINDOWS\system32\SogouTSF.ime
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\fb99c99c5b159c1b6658d58a279c1b5d7f09fea9_0001480768.,LiQMAxHB
|