6314af5ed496dba06362c6c1698ded89.exe

Zoobam

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application 6314af5ed496dba06362c6c1698ded89.exe by Zoobam has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Zoobam  (signed and verified)

MD5:
d8ceae2998ccd70b339b73bc328db114

SHA-1:
b1514b4a35e0b27f564771474d1ff9b8cd19f26f

SHA-256:
dcb45469c67ba52620e94db3562425f11ef4aa4f65b110127e5c9f739d983d56

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/24/2024 5:42:09 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.KJ
5627563

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.06.03

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

Arcabit
Application.Bundler.KJ
1.0.0.425

avast!
Win32:Adware-CIX [PUP]
150531-1

AVG
Generic
2016.0.3090

Bitdefender
Application.Bundler.KJ
1.0.20.765

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/20540

Comodo Security
Application.Win32.DownloadAdmin.ANGL
22316

Dr.Web
Trojan.Vittalia.36
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.KJ
10.0.0.5366

ESET NOD32
Win32/DownloadAdmin.H potentially unwanted application
7.0.302.0

F-Prot
W32/S-518b5669
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.KJ
5.14.151

G Data
Application.Bundler.KJ
15.6.25

K7 AntiVirus
Unwanted-Program
13.204.16111

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.06.02.01

MicroWorld eScan
Application.Bundler.KJ
16.0.0.459

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.30.24.1636

Norman
Application.Bundler.KJ
03.12.2014 13:20:04

Reason Heuristics
PUP.Tightrope.Bundler
15.6.2.13

Sophos
PUA 'DownloadAdmin' (of type Adware)
5.14

Total Defense
Win32/Tnega.IQCCUAC
37.1.62.1

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40552

File size:
826.2 KB (846,016 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Common path:
C:\users\{user}\appdata\local\temp\6314af5ed496dba06362c6c1698ded89.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
10/15/2014 9:27:59 PM

Valid to:
10/15/2017 9:27:59 PM

Subject:
CN=Zoobam, O=Zoobam, L=Kirkland, S=Washington, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EA9D31E75E043

File PE Metadata
Compilation timestamp:
7/15/2014 11:29:31 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:VxpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8S2:np9sVuaVdvgVbmgGDijyikg52

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to st-sh-us-dc1-002.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-240-190-28.jfk6.r.cloudfront.net  (54.240.190.28:80)

TCP (HTTP):
Connects to server-54-230-52-248.jfk6.r.cloudfront.net  (54.230.52.248:80)

TCP (HTTP):
Connects to server-54-192-55-20.jfk6.r.cloudfront.net  (54.192.55.20:80)

TCP (HTTP):
Connects to server-54-192-55-143.jfk6.r.cloudfront.net  (54.192.55.143:80)

TCP (HTTP):
Connects to ns237133.ovh.net  (37.59.34.142:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to 50.22.63.138-static.reverse.softlayer.com  (50.22.63.138:80)

Remove 6314af5ed496dba06362c6c1698ded89.exe - Powered by Reason Core Security