minecraftdl_19049.exe

SoftApp

Artur Kozak

The installer which is distributed via file sharing sites such as TusFiles uses the 'download manager' which wraps the original file in a adware filled bundle. The application minecraftdl_19049.exe, “Installer for SoftApp” by Artur Kozak has been detected as adware by 34 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SetApp  (signed by Artur Kozak)

Product:
SoftApp

Description:
Installer for SoftApp

Version:
2014.1.26.1549

MD5:
b44e18a0be9c3bccb51fef308b542bad

SHA-1:
7f88974f898fe51a74545dc46bc9524b760dc0c3

SHA-256:
73eaa72938bb012c2b24a6f6554705984d7ba4a48a3f54c81cc28872645d5e71

Scanner detections:
34 / 68

Status:
Adware

Explanation:
This bunder users the InstalleRex from WebPick Internet Holdings to install add-ons such as web browser extensions, coupon plugins (WebSave) and toolbars distributed via the tusfiles.net download site.

Analysis date:
4/26/2024 6:45:54 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11471784
856

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.10.02

Avira AntiVirus
Adware/InstalleRex.MOL
7.11.176.28

avast!
Win32:InstalleRex-AH [PUP]
140929-0

AVG
InstallRex.7cb
2015.0.3334

Bitdefender
Trojan.Generic.11471784
1.0.20.1375

Clam AntiVirus
Win.Trojan.Installerex-22
0.98/19465

Comodo Security
Application.Win32.InstalleRex.KG
19681

Dr.Web
Adware.Downware.1541
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Generic.11471784
14.10.02

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
10/2/2014

F-Prot
W32/InstallRex.B.gen
v6.4.7.1.166

F-Secure
Trojan.Generic.11471784
11.2014-02-10_5

G Data
Trojan.Generic.11471784
14.10.24

K7 AntiVirus
Unwanted-Program
13.183.13550

Kaspersky
Trojan.Win32.AntiFW
15.0.0.494

Malwarebytes
PUP.Optional.Tarma
v2014.10.02.08

McAfee
PUP-FHQ
5600.6990

MicroWorld eScan
Trojan.Generic.11471784
15.0.0.825

NANO AntiVirus
Riskware.Win32.Downware.ctkpgq
0.28.2.62440

nProtect
Trojan/W32.AntiFW.321296
14.10.02.01

Panda Antivirus
PUP/TSUploader
14.10.02.08

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
10.14.14.00

Reason Heuristics
Adware.WebPick.Installer.R
14.10.2.8

Rising Antivirus
PE:Malware.Adload!6.13CA
23.00.65.14930

Sophos
InstallRex
4.98

Trend Micro House Call
TSPY_DOWNLOADER_DD30045A.UVPA
7.2.275

Trend Micro
TSPY_DOWNLOADER_DD30045A.UVPA
10.465.02

Vba32 AntiVirus
Downware.TSU
3.12.26.3

VIPRE Antivirus
Threat.14871
33520

Zillya! Antivirus
Downloader.SneakyTrail.Win32.1
2.0.0.1940

File size:
313.8 KB (321,296 bytes)

Product version:
1.0.0.2

Copyright:
Copyright © 2014 SetApp

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\minecraftdl_19049.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/21/2013 8:00:00 PM

Valid to:
8/22/2014 7:59:59 PM

Subject:
CN=Artur Kozak, O=Artur Kozak, STREET=Parkovaya 19, L=Kyiv, S=Kyiv, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E03731FB48F020DDF5953B6498B83BC6

File PE Metadata
Compilation timestamp:
3/12/2013 4:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:5rJ9uEo2S1YnQmCX492DkwNP3qpYFQiY0Z56GICaNRCVEumbcF6ov5d889PgLVDL:5rfu6/eIo4jVW5soVCcQovoO0DJM+Eg

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.getapplicationmy.info  (54.201.215.30:80)

TCP (HTTP):
Connects to c1.getapplicationmy.info  (54.201.215.30:80)

 
http://c1.getapplicationmy.info/?step_id=1&installer_id=11295596&publisher_id=127&source_id=0&page_id=0&affiliate_id=0&country_code=ES&locale=EN&browser_id=2&download_id=11895601&external_id=11325686

Remove minecraftdl_19049.exe - Powered by Reason Core Security