installer_atubecatcher.exe

Vittalia Limited

This is the Vittalia Filewon Installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application installer_atubecatcher.exe by Vittalia Limited has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Vittalia DM installer. The file has been seen being downloaded from atubecatcher.es.
Publisher:
Vittalia Limited  (signed and verified)

MD5:
46f791c3b0814820015f5996a0b2aeef

SHA-1:
fecdf1a596dfdcc6767197f09182d857db0423a1

SHA-256:
b6f36495afa22e1d0e4d7788433911ff051a669e4bcbd67f7a446bb96993c4c6

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 4:21:59 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Vittalia.Bundler (M)
16.7.11.16

File size:
4.6 MB (4,780,208 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Vittalia DM

Common path:
C:\users\{user}\downloads\installer_atubecatcher.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/17/2013 7:00:00 PM

Valid to:
5/17/2016 6:59:59 PM

Subject:
CN=Vittalia Limited, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Vittalia Limited, L=Dublin, S=Dublin, C=IE

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6CC8DB30E67B3DF9E2607EE882D390AC

File PE Metadata
Compilation timestamp:
5/20/2014 8:02:56 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:sfOG0+tJH4fNYEdpeArSOee2BThV2eOl2Wlqj4GBo9SqXExb/KEnO:s2yq

Entry address:
0x1E32B

Entry point:
E8, E5, A7, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 48, 21, 44, 00, E8, EF, 40, 00, 00, E8, 61, 37, 00, 00, 0F, B7, F0, 6A, 02, E8, 78, A7, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 9A, 72, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
203 KB (207,872 bytes)

The file installer_atubecatcher.exe has been seen being distributed by the following URL.

Remove installer_atubecatcher.exe - Powered by Reason Core Security