nsl1532.tmp

SITE ON SPOT Ltd.

This is the Somoto BetterInstaller, an installer that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The file nsl1532.tmp by SITE ON SPOT has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. Includes the Somoto BetterInstaller, an adware installer that will bundle offers for additional third party applications, mostly adware toolbars, with legitimate softare and may be installed without adequate user consent.
Publisher:
SITE ON SPOT Ltd.  (signed and verified)

Version:
1.0.0.1

MD5:
2e50a84c3387dae44c20340040424b0f

SHA-1:
a24c17b8a1708535b4c8616812a8723176ec5eba

SHA-256:
d2ff47da4684aa45972627f967ae8d3eafbacb84f077a55c542ccd4426ea4aac

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Uses the Somoto 'BetterInstaller' to bundle additional (unwanted) software during install without adequate consent.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
5/5/2024 7:54:56 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Somoto.AG
461

AhnLab V3 Security
Win-PUP/Somoto
2015.09.24

Avira AntiVirus
PUA/Somoto.hzis
8.3.2.2

Arcabit
Application.Bundler.Somoto.AG
1.0.0.567

avast!
Win32:Somoto-P [PUP]
2014.9-151101

AVG
AdLoad.S
2016.0.2939

Baidu Antivirus
Adware.Win32.Somoto
4.0.3.15111

Bitdefender
Application.Bundler.Somoto.AG
1.0.20.1525

Bkav FE
W32.HfsAdware
1.3.0.7237

Clam AntiVirus
Win.Adware.Somoto-2
0.98/21511

Comodo Security
Application.Win32.Mazel.ANGL
23293

Dr.Web
Trojan.Packed.28357
9.0.1.0305

ESET NOD32
Win32/Somoto.G potentially unwanted
9.12296

F-Prot
W32/Trojan2.OUSK
v6.4.7.1.166

F-Secure
Application.Bundler.Somoto
11.2015-01-11_1

K7 AntiVirus
Trojan
13.210.17320

Kaspersky
not-a-virus:Downloader.NSIS.Mazel
14.0.0.1188

Malwarebytes
PUP.Optional.Somoto
v2015.11.01.11

McAfee
Artemis!2E50A84C3387
5600.6595

MicroWorld eScan
Application.Bundler.Somoto.AG
16.0.0.915

NANO AntiVirus
Riskware.Nsis.Adware.dshbbp
0.30.26.3725

Panda Antivirus
PUP/Somoto
15.11.01.11

Qihoo 360 Security
Win32/Virus.Downloader.244
1.0.0.1015

Quick Heal
PUA.Siteonspot.Gen
11.15.14.00

Reason Heuristics
PUP.Somoto.SITEONSPOT.Bundler (M)
15.11.1.11

Sophos
Somoto BetterInstaller (PUA)
4.98

SUPERAntiSpyware
PUP.Somoto/Variant
9534

VIPRE Antivirus
Trojan.Win32.Generic
44014

File size:
420.2 KB (430,320 bytes)

Bundler/Installer:
Somoto BetterInstaller (using Nullsoft Install System)

Language:
Neovisno o jeziku

Common path:
C:\users\{user}\appdata\local\temp\nsl1532.tmp

Digital Signature
Authority:
Thawte, Inc.

Valid from:
6/28/2013 2:00:00 AM

Valid to:
6/29/2015 1:59:59 AM

Subject:
CN=SITE ON SPOT Ltd., O=SITE ON SPOT Ltd., L=Tel Aviv, S=NA, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
3EE11B140A803DE260823157A875B8C5

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:pFCGiu0gToBBUfeArF0OuHkHq2MzikVPqXq:pF5d0gYSfDu4rMzZPqXq

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file nsl1532.tmp has been seen being distributed by the following URL.

Remove nsl1532.tmp - Powered by Reason Core Security