setup1000v2.exe

VOLARO Ltd.

The application setup1000v2.exe by VOLARO has been detected as adware by 25 anti-malware scanners. This is a setup program which is used to install the application. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from s3-eu-west-1.amazonaws.com.
Publisher:
VOLARO Ltd.  (signed and verified)

MD5:
dbae99c0214883509daec1df34b87ad6

SHA-1:
74ddd4c317debbaec21faa6b96046a143b649d8a

SHA-256:
5cd5576309825a73d6b7c9c4d23c0e40fba95a778d2f5113efd0bb21021d6f91

Scanner detections:
25 / 68

Status:
Adware

Analysis date:
5/7/2024 6:16:12 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.Generic.598302
1135

Agnitum Outpost
Adware.Vonteera
7.1.1

avast!
Win32:Adware-BGC [Adw]
2014.9-131226

AVG
Generic5.ADEP.dropper
2014.0.3613

Baidu Antivirus
[19:18:18]
4.0.3.131226

Bkav FE
W32.Clod2ca.Trojan
1.3.0.4613

Comodo Security
Heur.Suspicious
17604

Dr.Web
Trojan.StartPage.55388
9.0.1.0360

ESET NOD32
Win32/Toolbar.GadgetBox (variant)
7.9284

Fortinet FortiGate
Adware/Vonteera
12/26/2013

F-Secure
Dropped:Adware.Generic.598302
11.2013-26-12_5

IKARUS anti.virus
Win32.AdWare.BGC
t3scan.2.2.29

K7 AntiVirus
Riskware
13.175.10825

Kaspersky
not-a-virus:AdWare.Win32.Vonteera
14.0.0.4562

McAfee
Artemis!DBAE99C02148
5600.7269

Microsoft Security Essentials
Adware:Win32/Vonteera
1.165.247.01

MicroWorld eScan
Dropped:Adware.Generic.598302
14.0.0.1080

Quick Heal
Adware.Vonteera (Not a Virus)
12.13.12.00

Reason Heuristics
PUP.Installer.VOLARO.L
14.8.7.21

Rising Antivirus
PE:Trojan.Win32.Generic.15B9763D!364475965
23.00.65.131224

Sophos
Vonteera
4.96

Trend Micro House Call
TROJ_GEN.F47V0905
7.2.360

Trend Micro
TROJ_GEN.R0CBC0DJ113
10.465.26

Vba32 AntiVirus
AdWare.Vonteera
3.12.24.3

VIPRE Antivirus
Vonteera
25394

File size:
1.1 MB (1,101,688 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup1000v2.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/15/2013 3:00:00 AM

Valid to:
2/28/2014 2:59:59 AM

Subject:
CN=VOLARO Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=VOLARO Ltd., L=Sofia, S=Bulgaria, C=BG

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
45902E82A000D2497C38FE709EF124BC

File PE Metadata
Compilation timestamp:
8/23/2013 7:27:30 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:1xfFf44ZbsIlqTnpwVQ2R026zrqsxUn1UOe8/mUJt1E+kTScFe:1Xz9tMTp6mXNxUn1UOFpJtpbcM

Entry address:
0x3397

Entry point:
E8, 57, 47, 00, 00, E9, 79, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B...
 
[+]

Entropy:
7.9435  (probably packed)

Code size:
51.5 KB (52,736 bytes)

The file setup1000v2.exe has been seen being distributed by the following URL.

Remove setup1000v2.exe - Powered by Reason Core Security