atube catcher.exe

Eilio Developments, s.l.

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application atube catcher.exe by Eilio Developments, s.l has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Eilio Developments, s.l.  (signed and verified)

MD5:
2fb4df87df91d82aaf4f496639a6e336

SHA-1:
6dcf6d0dedd9c86cecdcaa807c109e6e66812b51

SHA-256:
651ffe0d9920aea4e9f5e2fb5c14ac184fbc782cd4bd6315c8403bf7f4fa1e00

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 2:27:29 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mplug.37
647

Agnitum Outpost
PUA.Solimba
7.1.1

AhnLab V3 Security
PUP/Win32.Solimba
2015.04.20

Avira AntiVirus
PUA/Solimba.Gen4
3.6.1.96

AVG
Generic
2016.0.3125

Bitdefender
Gen:Variant.Jaik.6157
1.0.20.590

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-863766
0.98/20538

Comodo Security
Application.Win32.Solimba.XL
21825

Dr.Web
Adware.Downware.10662, Adware.Downware.10857
9.0.1.0118

Emsisoft Anti-Malware
Gen:Variant.Adware.Mplug.37
8.15.04.28.04

ESET NOD32
MSIL/Solimba.AM potentially unwanted application
9.7.0.302.0

F-Prot
W32/S-e109e6b2
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Mplug
11.2015-28-04_3

G Data
Gen:Variant.Jaik.6157
15.4.25

herdProtect (fuzzy)
2015.7.28.19

IKARUS anti.virus
not-a-virus:Downloader.Morstar
t3scan.1.8.9.0

K7 AntiVirus
Unwanted-Program
13.202.15641

Kaspersky
not-a-virus:Downloader.Win32.Morstar
14.0.0.2122

MicroWorld eScan
Gen:Variant.Adware.Mplug.37
16.0.0.354

NANO AntiVirus
Trojan.Win32.Morstar.dpnbhi
0.30.16.1110

Norman
Gen:Variant.Adware.Mplug.37
11.20150728

Reason Heuristics
Threat.EilioDevelopments
15.4.28.12

Rising Antivirus
PE:Malware.Morstar!6.1BD6
23.00.65.15426

Sophos
PUA 'Solimba Installer'
5.14

Vba32 AntiVirus
Downware.Morstar
3.12.26.3

VIPRE Antivirus
Threat.4150696
40552

Zillya! Antivirus
Backdoor.PePatch.Win32.69751
2.0.0.2144

File size:
514.1 KB (526,432 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\atube catcher.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/24/2014 9:00:00 PM

Valid to:
7/24/2017 8:59:59 PM

Subject:
CN="Eilio Developments, s.l.", O="Eilio Developments, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0EF8CB39AB15607AB4EF554EB245AFB1

File PE Metadata
Compilation timestamp:
3/28/2015 4:35:00 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:ffv/cSGxdtQnvIIR40X7+u0Zpk2JjAUd19nVRkD:fn/cSa3QAIRRL30x0Ur9noD

Entry address:
0xC1DC

Entry point:
E8, 5B, 4D, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 08, 1B, 42, 00, E8, 3E, 15, 00, 00, E8, 2C, 4F, 00, 00, 0F, B7, F0, 6A, 02, E8, EE, 4C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 89, 42, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
98 KB (100,352 bytes)

Remove atube catcher.exe - Powered by Reason Core Security