hotspot shield 3.32.exe

Linkular LLC

The application hotspot shield 3.32.exe by Linkular has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. The file has been seen being downloaded from fastdownloads.info.
Publisher:
Linkular LLC  (signed and verified)

MD5:
396575fae3512b2d3b29e1531ee8bd5f

SHA-1:
46e9482aa5fef86ac97e3a1155c80bda6c479862

SHA-256:
4e2c0b8fcf649ced29055578cab80633a0d6a267261a9cf7e87ecd7cd305e165

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 8:22:19 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.DV
855

AegisLab AV Signature
ADWARE-Linkular.Gen
2.1.4+

Avira AntiVirus
APPL/Linkular.D.21
7.11.176.116

avast!
Rootkit-gen [Rtk]
140929-0

AVG
Linkular
2015.0.3333

Bitdefender
Application.Bundler.DV
1.0.20.1380

Clam AntiVirus
Win.Adware.Linkular-1
0.98/19476

Comodo Security
ApplicUnwnt
19693

Dr.Web
Adware.PowerPack.4
9.0.1.05190

ESET NOD32
Win32/AdWare.Linkular.AJ application
7.0.302.0

F-Prot
W32/Linkun.A (exact, not disinfectable)
4.6.5.141

F-Secure
Application.Bundler.DV
11.2014-03-10_6

G Data
Application.Bundler.DV
14.10.24

K7 AntiVirus
Adware
13.183.13550

Kaspersky
not-a-virus:AdWare.Win32.Linkun
15.0.0.494

Malwarebytes
PUP.Optional.Linkular
v2014.10.03.09

McAfee
PowerPack
5600.6989

MicroWorld eScan
Application.Bundler.DV
15.0.0.828

NANO AntiVirus
Riskware.Win32.Linkular.dbpxeq
0.28.2.62440

nProtect
Trojan-Clicker/W32.Linkun.458000
14.10.02.01

Reason Heuristics
PUP.Linkular.S
14.10.3.8

Rising Antivirus
PE:Trojan.Win32.Generic.16B41D8D!380902797
23.00.65.141001

Sophos
Linkular
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
10322

Trend Micro House Call
TROJ_SPNR.0BIT14
7.2.276

Trend Micro
TROJ_SPNR.0BIT14
10.465.03

Vba32 AntiVirus
Signed-Downware.Linkular
3.12.26.3

VIPRE Antivirus
Threat.4150696
33520

File size:
447.3 KB (458,000 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\hotspot shield 3.32.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
9/6/2013 4:09:02 AM

Valid to:
9/5/2014 11:14:15 PM

Subject:
CN=Linkular LLC, O=Linkular LLC, L=Redondo Beach, S=California, C=US

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
27C70F809279A3

File PE Metadata
Compilation timestamp:
12/6/2009 2:52:01 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:XrfU3sc3Xy9uTk4FF1g38Hx1iCJXOyC1aNJjrlIpGPy+:XrfU3N3i9uTk4rH1fiaNhRIpGPy+

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9130

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file hotspot shield 3.32.exe has been seen being distributed by the following URL.

Remove hotspot shield 3.32.exe - Powered by Reason Core Security