00000000

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The file 00000000 by Somoto has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. Includes the Somoto BetterInstaller, an adware installer that will bundle offers for additional third party applications, mostly adware toolbars, with legitimate softare and may be installed without adequate user consent.
Publisher:
Somoto Ltd.  (signed and verified)

MD5:
da0fe941a936e64112db32f2a2be02c6

SHA-1:
8ae956248941d02964167b02e84ddf2b7d93cbc0

SHA-256:
6c554f40ae6de72d6dd44a5e22817307a0638bdd55b8e06a9348c40cc4efbf69

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Uses the Somoto 'BetterInstaller' to bundle additional (unwanted) software during install without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/26/2024 6:17:33 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Somoto.J
825

AhnLab V3 Security
Win-PUP/Somoto
2014.11.03

Avira AntiVirus
APPL/Somoto.Gen2
7.11.182.198

avast!
Somoto-R [PUP]
141025-0

AVG
Generic
2015.0.3303

Baidu Antivirus
Adware.Win32.Somoto
4.0.3.14112

Bitdefender
Application.Bundler.Somoto.J
1.0.20.1530

Clam AntiVirus
Win.Adware.Somoto
0.98/21411

Comodo Security
Application.Win32.Somoto.CK
19972

Dr.Web
Trojan.Packed.28357
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.Somoto
14.11.02

ESET NOD32
Win32/Somoto.G potentially unwanted application
7.0.302.0

F-Secure
Application.Bundler.Somoto.J
11.2014-02-11_1

K7 AntiVirus
Unwanted-Program
13.185.13866

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.494

McAfee
Somoto-BetterInstaller
5600.6959

MicroWorld eScan
Application.Bundler.Somoto.J
15.0.0.918

NANO AntiVirus
Riskware.Nsis.Adware.dbnhrj
0.28.6.62995

nProtect
Trojan-Clicker/W32.Agent.225304
14.10.31.01

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Quick Heal
AdWare.Agent.r7 (Not a Virus)
11.14.14.00

Reason Heuristics
PUP.Somoto.I
14.11.2.11

Sophos
Somoto BetterInstaller
4.98

SUPERAntiSpyware
PUP.Somoto/Variant
10262

Trend Micro House Call
TROJ_GEN.R0C1C0EJ614
7.2.306

Trend Micro
TROJ_GEN.R0C1C0EJ614
10.465.02

VIPRE Antivirus
Threat.4150696
34232

File size:
220 KB (225,304 bytes)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\appdata\local\google\chrome\user data\default\file system\005\t\00\00000000

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/1/2014 8:00:00 PM

Valid to:
7/2/2015 7:59:59 PM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
6A0C39D0252522A9C448352858ACAACB

File PE Metadata
Compilation timestamp:
12/17/2010 4:14:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:h22ihA0m3BJX0ovhWuSPLeCY1MXBja1I1+Vcz7PRo1TB7fR96jST608DkSxPFEJu:CA0m3D0oJkPC/qLr7PRozF9oS6lnYDQH

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.7517  (probably packed)

Code size:
28.5 KB (29,184 bytes)

The file 00000000 has been seen being distributed by the following URL.

Remove 00000000 - Powered by Reason Core Security