el midrash dice devarim pdf downloader__3687_i1409858976_il1170164.exe

ITL-GROUP LLC

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application el midrash dice devarim pdf downloader__3687_i1409858976_il1170164.exe by ITL-GROUP has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the Amonetize Downloader installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
ITL-GROUP LLC  (signed and verified)

Version:
1.1.5.26

MD5:
7b03231461f98d85f46ebe2feb06c6c8

SHA-1:
ae5edb986a0553236ce8844139781d68ffb71caa

SHA-256:
4520b637dda8859ddea72634b9dffaad16f66cc31038b6a0c39b7d879771aaaa

Scanner detections:
24 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 7:35:18 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Strictor.68509
805

AhnLab V3 Security
PUP/Win32.Amonetiz
2014.11.20

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.188.28

avast!
Win32:Amonetize-GA [PUP]
2014.9-141124

AVG
Generic
2015.0.3283

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.141124

Bitdefender
Gen:Variant.Adware.Strictor.68509
1.0.20.1625

Emsisoft Anti-Malware
Gen:Variant.Adware.Strictor.68509
8.14.11.21.08

ESET NOD32
Win32/Amonetize.BP (variant)
8.10763

Fortinet FortiGate
Riskware/Amonetize
11/21/2014

F-Secure
Gen:Variant.Adware.Strictor.68509
11.2014-21-11_6

G Data
Gen:Variant.Adware.Strictor.68509
14.11.24

K7 AntiVirus
Unwanted-Program
13.185.14098

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.2898

McAfee
Artemis!7B03231461F9
5600.6939

MicroWorld eScan
Gen:Variant.Adware.Strictor.68509
15.0.0.975

NANO AntiVirus
Riskware.Win32.Amonetize.djdzzo
0.28.6.63474

Panda Antivirus
Generic Suspicious
14.11.21.08

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.ITLGROUP.?
14.11.21.23

Rising Antivirus
PE:Trojan.Win32.Generic.17A6DC21!396811297
23.00.65.141122

Sophos
Generic PUA JG
4.98

Trend Micro House Call
TROJ_GEN.R0C1H09KJ14
7.2.328

VIPRE Antivirus
Threat.4150696
34948

File size:
409.7 KB (419,560 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Amonetize Downloader

Language:
English (United States)

Common path:
C:\users\{user}\downloads\el midrash dice devarim pdf downloader__3687_i1409858976_il1170164.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
10/19/2014 6:00:00 PM

Valid to:
10/20/2015 5:59:59 PM

Subject:
CN=ITL-GROUP LLC, O=ITL-GROUP LLC, L=Selyshche Doslidne, S=Selyshche Doslidne, C=UA

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
080AA229F6377F023DF6C8F878AC3719

File PE Metadata
Compilation timestamp:
11/21/2014 4:02:49 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:7PAKaZTCIRCnwvDlO4ZP3E/KKh770msYj2:7Y1+wvDlO4ZfBKtsd

Entry address:
0x25CC4

Entry point:
E8, 2E, AC, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 10, A1, E0, F9, 44, 00, 33, C5, 89, 45, FC, 8B, 55, 18, 53, 33, DB, 56, 57, 3B, D3, 7E, 1F, 8B, 45, 14, 8B, CA, 49, 38, 18, 74, 08, 40, 3B, CB, 75, F6, 83, C9, FF, 8B, C2, 2B, C1, 48, 3B, C2, 7D, 01, 40, 89, 45, 18, 89, 5D, F8, 39, 5D, 24, 75, 0B, 8B, 45, 08, 8B, 00, 8B, 40, 04, 89, 45, 24, 8B, 35, 6C, E0, 43, 00, 33, C0, 39, 5D, 28, 53, 53, FF, 75, 18, 0F, 95, C0, FF, 75, 14, 8D, 04, C5, 01, 00, 00, 00, 50, FF, 75, 24, FF, D6, 8B, F8, 89...
 
[+]

Entropy:
6.6833

Code size:
244 KB (249,856 bytes)

The file el midrash dice devarim pdf downloader__3687_i1409858976_il1170164.exe has been seen being distributed by the following 2 URLs.