majid.exe

Shlomy Golani

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application majid.exe, “Installer for SummerSoft” by Shlomy Golani has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SummerSoft  (signed by Shlomy Golani)

Product:
SummerSoft

Description:
Installer for SummerSoft

Version:
2013.8.28.1249

MD5:
6fe8dab2c0541bbe3692c8794f9d2ec5

SHA-1:
453341cd158d8d0d436f88cfbcf37fda0d3495f2

SHA-256:
9e9055551d7d9c4664343066fb0a018c7672449d56739d5b507a6241b95ce5e6

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/26/2024 12:06:50 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.Badur
7.1.1

AhnLab V3 Security
Win-PUP/TSULoader.Gen
2015.03.01

Avira AntiVirus
TR/Badur.rpr
7.11.212.246

avast!
Win32:InstalleRex-Y [PUP]
150101-1

AVG
Generic
2016.0.3184

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.6379

Clam AntiVirus
Win.Trojan.Installerex-146
0.98/20126

Comodo Security
Application.Win32.InstalleRex.KG
21245

Dr.Web
Adware.Downware.1442
9.0.1.05190

ESET NOD32
Win32/InstalleRex.K potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
2/28/2015

F-Prot
W32/InstallRex.B
4.6.5.141

G Data
Win32.Application.InstalleRex
15.2.25

IKARUS anti.virus
PUA.TDownloader
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.1915118

Kaspersky
not-a-virus:HEUR:Downloader.Win32.AdLoad
15.0.0.543

Malwarebytes
PUP.Optional.Installrex
v2015.02.28.06

McAfee
Program.PUP-FHQ
16.8.708.2

NANO AntiVirus
Riskware.Win32.Downware.ctkphx
0.30.0.296

Panda Antivirus
PUP/TSUploader
15.02.28.06

Qihoo 360 Security
Trojan.Generic
1.0.0.1015

Quick Heal
Trojan.AntiFW.B5
2.15.14.00

Reason Heuristics
Adware.WebPick.Installer
15.2.28.18

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.15226

Sophos
PUA 'InstallRex'
5.11

SUPERAntiSpyware
Adware.InstalleRex/Variant
10025

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Threat.4753027
37788

File size:
294.5 KB (301,544 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2012 SummerSoft

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\majid.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/17/2013 3:00:00 AM

Valid to:
1/18/2014 2:59:59 AM

Subject:
CN=Shlomy Golani, O=Shlomy Golani, STREET=Wingate 56, L=Beer Sheva, S=Beer Sheva, PostalCode=84428, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009FC86200EC0FF58D1C39395238030858

File PE Metadata
Compilation timestamp:
3/12/2013 11:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:orkv9uEo2S1YnQmCX492DkwNP3qpYFokr2maiiMlGEWjsUnuGBauPvYBy7MliI1Y:orklu6/eIo41gFS1n7BFPv4yOiI1UQJQ

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9566

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file majid.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=18393210&publisher_id=839&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=55179630&external_id=0&session_id=110359260&hardware_id=128752470&installer_file_name=majid

Remove majid.exe - Powered by Reason Core Security