raidcall setup.exe

Zulu Soft SRL

This the Soft32 ad-supported download manager that bundles additional PUP offers. "During the download process we may show commercial offers, such as a toolbar or other browser add-ons. The download manager is in no way affiliated or endorsed by the author of this product." The application raidcall setup.exe by Zulu Soft SRL has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Soft32 Download Manager installer.
Publisher:
Zulu Soft SRL  (signed and verified)

MD5:
fd7862915ea861ea4c39e1fa184581fa

SHA-1:
ecae1b3b99d3946edcda70a55b5533a01c436d9d

SHA-256:
08ea79048f8bef131a22de0e22223413faa9bd83ded95db8e5ee4ef902dc85f6

Scanner detections:
1 / 68

Status:
Adware

Explanation:
The setup file is part of the Soft32.com download and install manager. It is an ad-supported installer and attempts to get the user to install various adware toolbars, browser add-ons, game applications or other potentially unwanted programs. If a sponsored software offer such as a toolbar is installed it might change the User’s home page, default search settings and 404 traffic. Note, the software installed by Soft32 is probably safe, just the installer is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/24/2024 1:43:55 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Downloader.Bundler.Soft32.Installer (M)
16.3.8.5

File size:
744.2 KB (762,096 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Soft32 Download Manager (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\raidcall setup.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
6/3/2013 9:00:00 PM

Valid to:
6/17/2016 8:59:59 PM

Subject:
CN=Zulu Soft SRL, O=Zulu Soft SRL, L=Sibiu, S=Sibiu, C=RO, SERIALNUMBER=J32/987/2007, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RO

Issuer:
CN=Symantec Class 3 Extended Validation Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
22D4D7E5042BE9C2999CB05C4CA2BB4F

File PE Metadata
Compilation timestamp:
12/5/2009 8:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:OAFB825upUsFQRyIfcmOcsLCq3XZngcaqHlQaN8trCKL601HmDG:v7825QwRfLsLCWNgeQPrCE1Hm

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file raidcall setup.exe has been seen being distributed by the following URL.

Remove raidcall setup.exe - Powered by Reason Core Security