raidcall setup.exe

I.T.N.T. SRL

This the Soft32 ad-supported download manager that bundles additional PUP offers. "During the download process we may show commercial offers, such as a toolbar or other browser add-ons. The download manager is in no way affiliated or endorsed by the author of this product." The application raidcall setup.exe by I.T.N.T. SRL has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Soft32 Download Manager installer.
Publisher:
I.T.N.T. SRL  (signed and verified)

Version:
1.0.0.0

MD5:
ccacb99a7b6e9a56d3d64302b154cf75

SHA-1:
d68b8318f5afb7362387f24bf2864234061ceba4

SHA-256:
69d083e493b4ab0c15f0b61ff05a5a43c52da12b9cd82e9f5a1938143f32c0a5

Scanner detections:
1 / 68

Status:
Adware

Explanation:
The setup file is part of the Soft32.com download and install manager. It is an ad-supported installer and attempts to get the user to install various adware toolbars, browser add-ons, game applications or other potentially unwanted programs. If a sponsored software offer such as a toolbar is installed it might change the User’s home page, default search settings and 404 traffic. Note, the software installed by Soft32 is probably safe, just the installer is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/18/2024 3:51:33 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Downloader.Bundler.Soft32.Installer (M)
16.2.1.10

File size:
924.3 KB (946,456 bytes)

Product version:
1.0.0.0

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Soft32 Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\raidcall setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/25/2012 6:00:00 PM

Valid to:
3/22/2015 6:59:59 PM

Subject:
CN=I.T.N.T. SRL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=I.T.N.T. SRL, L=Sibiu, S=Sibiu, C=RO

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2C5182859A028A663B668C63FE5C1CD7

File PE Metadata
Compilation timestamp:
5/24/2013 8:05:47 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:Py8jkl1aat9+DISZZNWQIV+KqcLHFpJt8hJB83WO+:FSwaeZzgEyltgJa3

Entry address:
0x2FB5A0

Entry point:
60, BE, 00, 30, 62, 00, 8D, BE, 00, E0, DD, FF, C7, 87, 34, FC, 25, 00, CB, 88, 4F, 45, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Entropy:
7.8888

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
868 KB (888,832 bytes)

The file raidcall setup.exe has been seen being distributed by the following URL.

Remove raidcall setup.exe - Powered by Reason Core Security