minecraftdl_41776.exe

SoftApp

Artur Kozak

The installer which is distributed via file sharing sites such as TusFiles uses the 'download manager' which wraps the original file in a adware filled bundle. The application minecraftdl_41776.exe, “Installer for SoftApp” by Artur Kozak has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SetApp  (signed by Artur Kozak)

Product:
SoftApp

Description:
Installer for SoftApp

Version:
2014.1.29.1621

MD5:
9faac1f211d3ce678f08ee3eda47b2e0

SHA-1:
4f2d65ad7fd5d7aede6155e149f5647001bfdfa1

SHA-256:
21b50ce547b36379c79d9866846ad86120564f021fb54e7260564d7edcfa6c9f

Scanner detections:
33 / 68

Status:
Adware

Explanation:
This bunder users the InstalleRex from WebPick Internet Holdings to install add-ons such as web browser extensions, coupon plugins (WebSave) and toolbars distributed via the tusfiles.net download site.

Analysis date:
4/25/2024 10:58:51 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11419563
5777739

Agnitum Outpost
PUA.InstalleRex
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2015.04.29

Avira AntiVirus
ADWARE/Adload.ger
3.6.1.96

avast!
Win32:InstalleRex-AI [PUP]
2014.9-150428

AVG
InstallRex.7cb
2016.0.3125

Bitdefender
Trojan.Generic.11419563
1.0.20.590

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.4959

Comodo Security
Application.Win32.InstalleRex.KG
21926

Dr.Web
Adware.Downware.1541
9.0.1.0118

Emsisoft Anti-Malware
Trojan.Generic.11065925
8.15.04.28.03

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
4/28/2015

F-Prot
W32/InstallRex.B
4.6.5.141

F-Secure
Trojan.Generic.11419563
5.13.68

G Data
Trojan.Generic.11419563
15.4.25

herdProtect (fuzzy)
2015.7.28.19

IKARUS anti.virus
AdWare.Downloader.InstallRex
t3scan.1.8.9.0

K7 AntiVirus
Unwanted-Program
13.203.15737

Kaspersky
Trojan.Win32.AntiFW
14.0.0.2122

McAfee
PUP-FHQ
5600.6781

MicroWorld eScan
Trojan.Generic.11065925
16.0.0.354

NANO AntiVirus
Riskware.Win32.Downware.ctkpgp
0.30.24.1357

Norman
Trojan.Generic.11419563
03.12.2014 13:20:04

nProtect
Trojan/W32.AntiFW.321168
14.10.02.01

Panda Antivirus
PUP/TSUploader
15.04.28.04

Quick Heal
Trojan.AntiFW.A5
4.15.14.00

Reason Heuristics
Adware.WebPick.Installer
15.4.28.11

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.15426

Sophos
PUA 'InstallRex'
5.13

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Threat.4150696
33624

Zillya! Antivirus
Trojan.AntiFW.Win32.50
2.0.0.2157

File size:
313.8 KB (321,280 bytes)

Product version:
1.0.0.2

Copyright:
Copyright © 2014 SetApp

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/22/2013 1:00:00 AM

Valid to:
8/23/2014 12:59:59 AM

Subject:
CN=Artur Kozak, O=Artur Kozak, STREET=Parkovaya 19, L=Kyiv, S=Kyiv, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E03731FB48F020DDF5953B6498B83BC6

File PE Metadata
Compilation timestamp:
3/12/2013 8:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:9rK9uEo2S1YnQmCX492DkwNP3qpYFtcM7dZssr+Ixf6LuDTKD2ay9KGYG0Le:9ryu6/eIo4vMResyEf0uP9d9UG0e

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9529

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file minecraftdl_41776.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.getapplicationmy.info  (54.201.215.30:80)

TCP (HTTP):
Connects to c1.getapplicationmy.info  (54.201.215.30:80)

 
http://c1.getapplicationmy.info/?step_id=1&installer_id=20866655&publisher_id=084&source_id=0&page_id=0&affiliate_id=0&country_code=ES&locale=EN&browser_id=2&download_id=21466660&external_id=20896745

Remove minecraftdl_41776.exe - Powered by Reason Core Security