parent.txt

tuguu sl

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The file parent.txt by tuguu sl has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the TUGUU DomaIQ Setup installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from ttb.lpcloudsvr410.com.
Publisher:
tuguu sl  (signed and verified)

MD5:
3fcedd8cf342744f555f897160242909

SHA-1:
9c6d257afe3cea2bd78a7daaeb15e5fc89f18570

SHA-256:
1117a5dcf4d637ab4774f3e4a9a53a119f741db0a2bd4e058d5c2e32db27af54

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles third-party components such as adware in the installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 7:02:31 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Tuguu.tuguusl.Bundler (M)
16.2.14.11

File size:
469.9 KB (481,192 bytes)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\appdata\local\temp\parent.txt

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
6/13/2013 7:06:55 AM

Valid to:
6/13/2014 7:06:55 AM

Subject:
CN=tuguu sl, O=tuguu sl, L=Adeje, S=Santa Cruz de Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
2B632A0CF95E4D

File PE Metadata
Compilation timestamp:
1/3/2014 5:33:12 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:PQduZgCDOfyZBnC+QRWNHsQGF0pcsMTXgQmz9eNLqjQ0:rZgCD9C+EWNML2pcsM7YReojb

Entry address:
0xD162

Entry point:
E8, C5, 63, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 18, 43, 42, 00, E8, C4, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 58, A8, 42, 00, 77, 22, 6A, 04, E8, B0, 65, 00, 00, 59, 83, 65, FC, 00, 56, E8, B7, 6D, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D0, 04, 00, 00, C3, 6A, 04, E8, AB, 64, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 70, F0, 41, 00, 83, 3D, 1C, A5, 42, 00, 00, 75, 18, E8, 6A, 5C, 00...
 
[+]

Entropy:
7.4378

Code size:
119.5 KB (122,368 bytes)

The file parent.txt has been seen being distributed by the following URL.

Remove parent.txt - Powered by Reason Core Security