hoolapp.exe

Hoolapp

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application hoolapp.exe by Hoolapp has been detected as adware by 9 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from software-files-a.cnet.com.
Publisher:
Hoolapp  (signed and verified)

MD5:
f1287ec4b18c9deecdad8ab8323ffad2

SHA-1:
00c3381176b4a3fc1b5b00abfcae97726e8d0ad1

SHA-256:
9b7ef5b5dcab6782494833b2f38d759e415db72ff06a0195c3f54ef7b420a5bb

Scanner detections:
9 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/25/2024 8:37:50 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.InstallCore
15.02.12

Avira AntiVirus
7.11.152.190

Dr.Web
Adware.InstallCore.69
9.0.1.043

ESET NOD32
Win32/InstallCore.AZ (variant)
9.9883

F-Prot
W32/InstallCore.W.gen
v6.4.7.1.166

McAfee
Artemis!F1287EC4B18C
5600.6857

Qihoo 360 Security
HEUR/Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo
15.2.12.9

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.15210

File size:
1.2 MB (1,282,760 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\hoolapp.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
11/20/2012 2:00:00 AM

Valid to:
11/21/2015 1:59:59 AM

Subject:
CN=Hoolapp, O=Hoolapp, STREET=63 Rothschild Blvd., L=Tel-Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1205B27293082834E7A5D38AE9D121B7

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:0y7OhPtoQnKeqGcQ9oe7r/JtMgGX7Z7888uLNGxGQ3Qm:0yWo/RQ9oMbJPG1788RNGx

Entry address:
0xD6670

Entry point:
55, 8B, EC, 83, C4, F0, B8, EC, 96, 41, 00, E8, 49, E0, FF, FF, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.8481

Developed / compiled with:
Microsoft Visual C++

Code size:
869.5 KB (890,368 bytes)

The file hoolapp.exe has been seen being distributed by the following URL.

Remove hoolapp.exe - Powered by Reason Core Security