clickheretodownloadsetup-cj7owl2t.exe

SITE ON SPOT Ltd.

This is the Somoto BetterInstaller, an installer that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application clickheretodownloadsetup-cj7owl2t.exe by SITE ON SPOT has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Somoto BetterInstaller installer. The file has been seen being downloaded from fileandmore.com and multiple other hosts.
Publisher:
SITE ON SPOT Ltd.  (signed and verified)

MD5:
db80544efc3d456f9dcaf2cfd02ec994

SHA-1:
094389d567870cb0778ee0c3cbd8ae6cfa590260

SHA-256:
7b02ccef30f140ea3889927dac1cb6cfaaeeecd7c917518c4f0d0dcfd3c94468

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/24/2024 4:55:51 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Somoto (M)
16.7.15.22

File size:
215.1 KB (220,248 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\downloads\clickheretodownloadsetup-cj7owl2t.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
6/28/2013 3:00:00 AM

Valid to:
6/29/2015 2:59:59 AM

Subject:
CN=SITE ON SPOT Ltd., O=SITE ON SPOT Ltd., L=Tel Aviv, S=NA, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
3EE11B140A803DE260823157A875B8C5

File PE Metadata
Compilation timestamp:
12/17/2010 11:14:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
6144:6A0m3D0o53tYAQpzrJKuyQ9UBkC2qzV05Txl/x:6A0iD0o53twp+twqx05T7x

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.7454  (probably packed)

Code size:
28.5 KB (29,184 bytes)

The file clickheretodownloadsetup-cj7owl2t.exe has been seen being distributed by the following 2 URLs.

http://fileandmore.com/nlp/l/adorikangfeed/.../dl?p1=1&p3=-_-MzIxYV8yNF8yNTE1XzI1NDNfQ09fMTg2LjE0NS4yNDkuMTMyXzdlMV83NTg2X0FEUw-_-LqOPtmbfswtzDw_nHDauoaFibGfa_FOaDzak-V__JEbaydd2pv9uktPhIPMMaGga1M1pjtG6jAAIMMNImPcJnak6pnt1aa00MGKMdAncGganObRc3m7rxFXPw8-UFm1IK8mHSoX5_sSdaUvCiJHMbrAh4vaGuljbjicrGqM-bXxwdKumLZ7gy1xxUnTMWGkuMGmzzfr6GNoA6vjRTphBr2WXdG7kNWljjZaJJUtEHxywmRexXO6GJ2MbBLuGKPlqP9bvxLwn2StIuNj4-lB1wVpgIYLBiuNozK4cDUblZkWjYhbEP2vMdvDeZiCTDbDnhoshWGOE1QOsLFuO9m_jKs2sb1GDcYVkiKbQDwlWkSrSa_Hq9qUNeiFrOqcY0vWcAg5LKPRrGHkXEtk4SGAakjY2QXybwA_ZFUx8KC4ujutd3Fvy&datetime=20140530_1701&utm_source=adorikangfeed&utm_medium=affiliate&utm_campaign=1&translate=en&tracking_percent=30.48&software_name=FLV Player&download_country=CO&rate=0.100625&margin=20&cpa_detective_session_id=3b0bex4rzcm6&timestamp=1401469309&__cookie=__utma=1.1714902408.1401469301.1401469301.1401469301.1; __utmb=1.2.10.1401469301; __utmc=1; __utmz=1.1401469301.1.1.utmcsr=adorikangfeed|utmccn=1|utmcmd=affiliate|utmcct=flvp

Remove clickheretodownloadsetup-cj7owl2t.exe - Powered by Reason Core Security