icreinstall_bitlordinstaller - facebook account hack.exe.exe

House of Life

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_bitlordinstaller - facebook account hack.exe.exe by House of Life has been detected as adware by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. According to AVG, this software downloads additional adware offers during setup. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
House of Life  (signed and verified)

MD5:
bcfbdc1fadfda9c2134d88c2eb8e3de6

SHA-1:
d23c4b449a20514d42979d3bb594cd6fc57e58e6

SHA-256:
f8911246112f0881394f0dbb9951bfd9a2708e07fefc43f91bd6dcdc518604d5

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/24/2024 10:00:36 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
7.11.181.38

AVG
Potentially harmful program Downloader.ATS
2014.0.4040

Comodo Security
Application.Win32.Installcore.HL
19890

Dr.Web
Trojan.Packed.24524
9.0.1.05190

ESET NOD32
Win32/InstallCore.BY potentially unwanted application
7.0.302.0

F-Prot
W32/A-42c63c6c
v6.4.7.1.166

IKARUS anti.virus
PUA.Downloader
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.185.13789

Malwarebytes
v2014.10.24.07

NANO AntiVirus
Riskware.Win32.InstallCore.dfgmdk
0.28.2.62841

Reason Heuristics
PUP.HouseofLife.u
14.10.24.18

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.141022

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
34218

File size:
673.5 KB (689,632 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_bitlordinstaller - facebook account hack.exe.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
6/17/2013 2:00:00 AM

Valid to:
6/18/2014 1:59:59 AM

Subject:
CN=House of Life, O=House of Life, STREET=Ølnes, L=Sogndal, S=Sogn og Fjordane, PostalCode=6856, C=NO

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00B04F15C36092438970725F31E534E1C7

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:Gh9yMJfsGNkpTsY2bANo7+CJYQdew7rzXbllBfu2QY44XWTkT8HTjuQjgnVwxcTa:myMJfsC2qC/xQowZrfu2B4u2kT8HTpgi

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)