dumpbios-usb_downloader-i6ayohiou.exe

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The application dumpbios-usb_downloader-i6ayohiou.exe by Somoto has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. The file has been seen being downloaded from www.solidfiles.com.
Publisher:
Somoto Ltd.  (signed and verified)

MD5:
bbfb2ba3663713c122507fe09751a99d

SHA-1:
c82371d7aed09e9ea2d35df8d195e291ae227b3e

SHA-256:
358b57a6527ebd09f8aef5c555753b3fbca30a723b54b3e894c23de3c00a5c8e

Scanner detections:
5 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 9:19:44 AM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Adware.Somoto
0.98/19300

ESET NOD32
Win32/Somoto.G potentially unwanted application
7.0.302.0

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.494

Reason Heuristics
PUP.Somoto.b
14.8.22.22

VIPRE Antivirus
Threat.4150696
32210

File size:
220 KB (225,304 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\downloads\dumpbios-usb_downloader-i6ayohiou.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/1/2014 5:00:00 PM

Valid to:
7/2/2015 4:59:59 PM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
6A0C39D0252522A9C448352858ACAACB

File PE Metadata
Compilation timestamp:
12/17/2010 1:14:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
6144:CA0m3D0oLhGhpqJtfRaF/wz6arLigBoyswk7/:CA0iD0oLh6pE5aF/wzFrLigBoyHk7/

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.7515  (probably packed)

Code size:
28.5 KB (29,184 bytes)

The file dumpbios-usb_downloader-i6ayohiou.exe has been seen being distributed by the following URL.

Remove dumpbios-usb_downloader-i6ayohiou.exe - Powered by Reason Core Security