dropbox.exe

LV-II fungor

Bechiro S.L.

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application dropbox.exe, “aufero detego tracto” by Bechiro S.L has been detected as adware by 36 anti-malware scanners. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars. The file has been seen being downloaded from www.win-install.com. While running, it connects to the Internet address cdn.solimba.com on port 80 using the HTTP protocol.
Publisher:
infidus vilitas facio  (signed by Bechiro S.L.)

Product:
LV-II fungor

Description:
aufero detego tracto

Version:
95.59.75.72

MD5:
2c3cebec9a9aa9f32ecb0621384b5fab

SHA-1:
fdfc3f532bc3e531855bec7dc272e8bf99e87a97

SHA-256:
4dbb2440e69be17dc28a631722974b05edbbbd1d1cb06211d87ebd73432b2082

Scanner detections:
36 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/25/2024 10:06:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.559386
6217246

Agnitum Outpost
PUA.Solimba
7.1.1

AhnLab V3 Security
PUP/Win32.Solimba
2014.11.05

Avira AntiVirus
APPL/Firseria.Gen8
7.11.182.126

avast!
MSIL:Solimba-V [PUP]
2014.9-150401

AVG
Adware BundleApp_r
2016.0.3153

Baidu Antivirus
Adware.Win32.FirseriaInstaller
4.0.3.1541

Bitdefender
Application.Generic.872462
1.0.20.455

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Application-508
0.98/19586

Comodo Security
Application.Win32.Solimba.LSW
19950

Dr.Web
Adware.Downware.8808
9.0.1.091

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.Kazy.132995
8.15.04.01.11

ESET NOD32
MSIL/Solimba.AH potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/Morstars
4/1/2015

F-Prot
W32/A-a1e0d357
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy
5.13.68

G Data
Application.Generic.872462
15.4.24

IKARUS anti.virus
AdWare.BundleApp
t3scan.1.8.3.0

K7 AntiVirus
Unwanted-Program
13.185.13840

Kaspersky
not-a-virus:AdWare.Win32.Fiseria
14.0.0.2258

Malwarebytes
PUP.Optional.Solimba
v2015.04.01.11

McAfee
Trojan.GenericATG-FARG!2C3CEBEC9A9A
16.8.708.2

MicroWorld eScan
Gen:Variant.Application.Bundler.Kazy.132995
16.0.0.273

NANO AntiVirus
Trojan.Win32.Morstar.dhdhyl
0.28.6.62995

Norman
Application.Generic.901379
03.12.2014 13:20:04

nProtect
Trojan-Clicker/W32.Fiseria.550592
15.04.01.01

Panda Antivirus
Adware/Firseria
15.04.01.11

Quick Heal
Adware.Firseria.A5
4.15.14.00

Reason Heuristics
PUP.Solimba
15.4.1.11

Rising Antivirus
PE:AdWare.Win32.Kazy.e!1075356768
23.00.65.15330

Sophos
Solimba Installer
4.98

Vba32 AntiVirus
Downware.Morstar
3.12.26.3

VIPRE Antivirus
Threat.4782980
34232

Zillya! Antivirus
Adware.Fiseria.Win32.2339
2.0.0.1974

File size:
537.7 KB (550,592 bytes)

Product version:
52.82.34.83

Copyright:
Copyright ferme

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/25/2014 1:00:00 AM

Valid to:
7/25/2016 12:59:59 AM

Subject:
CN=Bechiro S.L., O=Bechiro S.L., L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
0DE376129471B42CE6BCA90326047A34

File PE Metadata
Compilation timestamp:
10/27/2014 1:24:21 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:KxBt8xZr6zDTMJECEvL+JTDZ3oIjFZ77UARmM7B36:Kx0sDTRJjkF3oIjHnUAZ56

Entry address:
0xDE2C

Entry point:
E8, A3, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 58, 70, 42, 00, E8, FE, 15, 00, 00, E8, 74, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 36, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, FF, 64, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7046  (probably packed)

Code size:
113.5 KB (116,224 bytes)

The file dropbox.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to cdn.solimba.com  (95.211.6.35:80)

TCP (HTTP):
Connects to api.downloadmr.com  (95.211.39.161:80)

 
http://api.downloadmr.com/installer/59208891/launch

Remove dropbox.exe - Powered by Reason Core Security