setup.exe

Installer

Stepitapp LLC

The application setup.exe by Stepitapp has been detected as adware by 19 anti-malware scanners. The file has been seen being downloaded from www.mydownloadhome.com and multiple other hosts. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
Stepitapp LLC  (signed and verified)

Product:
Installer

Version:
1.0.0.0

MD5:
17fd46a07b732369b56a5020320f0b3e

SHA-1:
dec4f923bfc7f48c43ba600a3d8d60a8a1c87885

SHA-256:
6b718475d3a97d85298a97fd06868965aa3bf1721d628766ac43a9b778669fce

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
4/25/2024 1:03:24 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Dropper-gen [Drp]
2014.9-140807

Fortinet FortiGate
Riskware/Agent
8/7/2014

G Data
Win32.Trojan.Agent.4P134N
14.8.24

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.3442

McAfee
Artemis!17FD46A07B73
5600.7045

Panda Antivirus
Trj/Chgt.A
14.08.07.04

Qihoo 360 Security
Win32/Virus.Downloader.8e5
1.0.0.1015

Reason Heuristics
PUP.Installer.Stepitapp.F
14.8.7.16

Trend Micro House Call
TROJ_GEN.F47V0516
7.2.219

Vba32 AntiVirus
Downloader.Agent
3.12.26.0

VIPRE Antivirus
Conduit
29416

File size:
391.9 KB (401,328 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2013

Original file name:
FinalInstaller.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
12/10/2013 7:00:00 PM

Valid to:
12/11/2014 6:59:59 PM

Subject:
CN=Stepitapp LLC, O=Stepitapp LLC, POBox=1252, STREET=9 W. 31st Street, L=Bayonne, S=New Jersey, PostalCode=07002, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00EA7DEF51F4F715C2C81433CCD6B15766

File PE Metadata
Compilation timestamp:
5/11/2014 4:13:23 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:YUccjvOCAibqI59PpOPf201/z7psmJI9ftRDlD7G:fvhAibqI59Pk2cb7psmJ0ftRDlHG

Entry address:
0x6017E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.1976

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
376.5 KB (385,536 bytes)

The file setup.exe has been seen being distributed by the following 2 URLs.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

TCP (HTTP):

Remove setup.exe - Powered by Reason Core Security