setup.exe

Pour Over Digital

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe by Pour Over Digital has been detected as adware by 19 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. While running, it connects to the Internet address hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Pour Over Digital  (signed and verified)

MD5:
59a7796880deb50f3eedb610ab497578

SHA-1:
7d7ccc906d1febf16b9856930993c2bd47dc7a41

SHA-256:
d042b5f3e5430ed5ffd3d3f943d9a7844ac3d796dfd64f2f30ca15df0e140365

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/24/2018 3:39:13 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DownloadAdmin
2015.06.03

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

Antiy Labs AVL
Trojan/Win32.TSGeneric
1.0.0.1

avast!
Win32:DownloadAdmin-P [PUP]
150525-2

AVG
Generic
2016.0.3090

Bkav FE
W32.HfsAdware
1.3.0.6379

ByteHero BDV
Trojan.Win32.Atraps.b
6.2.2015.10

Clam AntiVirus
Win.Trojan.Downloadadmin
0.98/20543

Dr.Web
Trojan.Vittalia.65
9.0.1.05190

ESET NOD32
Win32/DownloadAdmin.I potentially unwanted application
7.0.302.0

F-Prot
W32/S-8649671e
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.204.16117

K7 Gateway Antivirus
Unwanted-Program
13.204.16117

Malwarebytes
PUP.Optional.DownloadAdmin.C
v2015.06.02.11

NANO AntiVirus
Trojan.Win32.XPACK.dprfbr
0.30.24.1636

Reason Heuristics
PUP.Tightrope.Bundler
15.6.2.18

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40780

File size:
654.5 KB (670,256 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/31/2014 2:00:00 AM

Valid to:
11/1/2015 1:59:59 AM

Subject:
CN=Pour Over Digital, O=Pour Over Digital, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1A73CF95C7D17B433DC88946E1784EFB

File PE Metadata
Compilation timestamp:
1/29/2015 8:35:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:e4BS2ly9NKPRdegPsgQr/745jezvROTVo80d1WU1ntTxJ10gJ1Tvz4:ehhKeiHQr/s1uRCBQWMxDp4

Entry address:
0x234A

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 78, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, F8, FD, FF, FF, FF, 15, 30, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 2C, 77, 40, 00, 6A, 08, A3, 98, 3D, 42, 00, E8, DD, F9, FF, FF, 53, 68, 60, 01, 00, 00, A3, A0, 3C, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 0B, 74, 40, 00, FF, 15, 50, 71, 40, 00, 68, 00, 74, 40, 00, 68, A0, 34, 42, 00, E8, 5A, F3, FF, FF, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57...
 
[+]

Entropy:
7.9733

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to st-sh-us-dc1-001.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-52-104.jfk6.r.cloudfront.net  (54.230.52.104:80)

TCP (HTTP):
Connects to server-54-192-55-38.jfk6.r.cloudfront.net  (54.192.55.38:80)

TCP (HTTP):
Connects to server-54-192-55-20.jfk6.r.cloudfront.net  (54.192.55.20:80)

TCP (HTTP):
Connects to server-54-192-55-167.jfk6.r.cloudfront.net  (54.192.55.167:80)

TCP (HTTP):
Connects to server-54-192-55-160.jfk6.r.cloudfront.net  (54.192.55.160:80)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (54.231.15.17:80)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.9.32:443)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to a23-67-250-136.deploy.static.akamaitechnologies.com  (23.67.250.136:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to 50.22.63.138-static.reverse.softlayer.com  (50.22.63.138:80)

Remove setup.exe - Powered by Reason Core Security