set1000-dfv4.exe

VOLARO Ltd.

The application set1000-dfv4.exe by VOLARO has been detected as adware by 27 anti-malware scanners. This is a setup program which is used to install the application. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from s3-eu-west-1.amazonaws.com and multiple other hosts.
Publisher:
VOLARO Ltd.  (signed and verified)

MD5:
93b82d73c79c3c0b47338e88dfb4cf7a

SHA-1:
56758081ecc90b26aacc3c004e90b492071326fb

SHA-256:
d266c5e093bbe005bfe9c819b7c9910bdd808ce13f82d397edf5592ccc39ae47

Scanner detections:
27 / 68

Status:
Adware

Analysis date:
4/28/2024 7:16:47 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.Generic.598302
857

Agnitum Outpost
Adware.Vonteera
7.1.1

AhnLab V3 Security
Adware/Win32.Vonteera
2013.11.20

Avira AntiVirus
Adware/Vonteera.A.22
7.11.114.140

avast!
Win32:Adware-BGC [Adw]
2014.9-141001

AVG
Generic5.ADEP.dropper
2014.0.3620

Baidu Antivirus
[19:18:18]
4.0.3.14101

Bkav FE
W32.Cloda8d.Trojan
1.3.0.4562

Comodo Security
ApplicUnwnt
17298

Dr.Web
Trojan.StartPage.55388
9.0.1.0353

ESET NOD32
Win32/Toolbar.GadgetBox (variant)
7.9067

Fortinet FortiGate
Adware/Vonteera
12/19/2013

F-Secure
Dropped:Adware.Generic.598302
11.2013-19-12_5

IKARUS anti.virus
AdWare.Vonteera
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.173.10249

Kaspersky
not-a-virus:AdWare.Win32.Vonteera
14.0.0.4596

McAfee
Artemis!93B82D73C79C
5600.7276

Microsoft Security Essentials
Adware:Win32/Vonteera
1.163.1557.0

MicroWorld eScan
Dropped:Adware.Generic.598302
14.0.0.1059

Quick Heal
Adware.Vonteera (Not a Virus)
10.14.12.00

Reason Heuristics
PUP.VOLARO.M
14.8.7.21

Rising Antivirus
PE:Trojan.Win32.Generic.15B9763D!364475965
23.00.65.14929

Sophos
Vonteera
4.96

Trend Micro House Call
TROJ_GEN.R0C1H01JN13
7.2.353

Trend Micro
TROJ_GEN.R0CBC0DJD13
10.465.19

Vba32 AntiVirus
AdWare.Vonteera
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic!SB.0
23520

File size:
1.1 MB (1,107,832 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\set1000-dfv4.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/15/2013 3:00:00 AM

Valid to:
2/28/2014 2:59:59 AM

Subject:
CN=VOLARO Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=VOLARO Ltd., L=Sofia, S=Bulgaria, C=BG

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45902E82A000D2497C38FE709EF124BC

File PE Metadata
Compilation timestamp:
9/19/2013 9:01:00 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:rpPohPwaYkbDbufPZD/3liYE3emcToW3+FUOU09OuwVz/R2gggCnvJM:r5ePwxkqfPR9zmA3+K/0AuwVzcgggCvC

Entry address:
0x3397

Entry point:
E8, 57, 47, 00, 00, E9, 79, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B...
 
[+]

Entropy:
7.9439  (probably packed)

Code size:
51.5 KB (52,736 bytes)

The file set1000-dfv4.exe has been seen being distributed by the following 2 URLs.

Remove set1000-dfv4.exe - Powered by Reason Core Security