drake.exe

Shlomy Golani

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application drake.exe, “Installer for SummerSoft” by Shlomy Golani has been detected as adware by 38 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SummerSoft  (signed by Shlomy Golani)

Product:
SummerSoft

Description:
Installer for SummerSoft

Version:
2013.9.13.1444

MD5:
1677032e961959a125077c78329f1fc4

SHA-1:
c96ac64b3b7e223b4322e9f16b37830cc5b3af07

SHA-256:
5b9df01537d861f39ef49e282ac95101bf0d19000817b19491eef4e83c53d538

Scanner detections:
38 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/25/2024 4:23:52 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.InstallRex.2
399

Agnitum Outpost
Trojan.Adware
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2015.06.04

Avira AntiVirus
ADWARE/InstallRex.Gen
8.3.1.6

avast!
Win32:InstalleRex-Y [PUP]
2014.9-160101

AVG
Generic
2017.0.2877

Bitdefender
Gen:Variant.Application.Bundler.InstallRex.2
1.0.20.5

Bkav FE
HW32.CDB
1.3.0.4959

Clam AntiVirus
Win.Adware.Installerex-3
0.98/20550

Comodo Security
Application.Win32.InstalleRex.KG
22330

Dr.Web
Adware.Downware.1442
9.0.1.01

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.InstallRex
8.16.01.01.08

ESET NOD32
Win32/InstalleRex.K potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
1/1/2016

F-Prot
W32/InstallRex.B
v6.4.6.5.141

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2016-01-01_6

G Data
Gen:Variant.Application.Bundler.InstallRex
16.1.25

IKARUS anti.virus
Trojan.AntiFW
t3scan.1.9.5.0

K7 AntiVirus
Unwanted-Program
13.204.16134

Kaspersky
not-a-virus:HEUR:Downloader.Win32.AdLoad
14.0.0.881

Malwarebytes
PUP.Optional.Installrex
v2016.01.01.08

McAfee
PUP-FDX!965D25D3FFC9
5600.6533

MicroWorld eScan
Gen:Variant.Application.Bundler.InstallRex.2
17.0.0.3

NANO AntiVirus
Riskware.Win32.Downware.crfmio
0.30.24.1636

Norman
Gen:Variant.Application.Bundler.InstallRex.2
11.20160101

nProtect
Trojan/W32.StartPage.306848
14.04.27.01

Panda Antivirus
PUP/TSUploader
16.01.01.08

Qihoo 360 Security
Trojan.Generic
1.0.0.1015

Quick Heal
PUA.Shlomygola.Gen
1.16.14.00

Reason Heuristics
Adware.WebPick.Installer (M)
16.1.1.20

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.151230

Sophos
PUA 'InstallRex'
5.15

SUPERAntiSpyware
Adware.InstalleRex/Variant
9411

Trend Micro House Call
TROJ_GEN.USCK25ACN
7.2.1

Trend Micro
TROJ_GEN.USCK25ACN
10.465.01

Vba32 AntiVirus
AdWare.Agent
3.12.26.4

VIPRE Antivirus
Threat.4753027
29800

Zillya! Antivirus
Trojan.StartPage.Win32.19645
2.0.0.1808

File size:
298 KB (305,136 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2012 SummerSoft

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\drake.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/16/2013 6:00:00 PM

Valid to:
1/17/2014 5:59:59 PM

Subject:
CN=Shlomy Golani, O=Shlomy Golani, STREET=Wingate 56, L=Beer Sheva, S=Beer Sheva, PostalCode=84428, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009FC86200EC0FF58D1C39395238030858

File PE Metadata
Compilation timestamp:
3/12/2013 3:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:qrkH9uEo2S1YnQmCX492DkwNP3qpYFkSJEw8NFPbNeIfV+iqhwpCIoDF:qrkdu6/eIo4/PPbNNfV+iUwpCPx

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9556

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file drake.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=41930692&publisher_id=193&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=125792076&external_id=0&session_id=251584152&hardware_id=293514844&installer_file_name=drake

Remove drake.exe - Powered by Reason Core Security