setup__2140_il37.exe

LLC

The application setup__2140_il37.exe by LLC has been detected as adware by 23 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-54-192-55-154.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
LLC   (signed and verified)

Version:
1.1.5.26

MD5:
22ec59a68f9e96fb1aacda31126ef6d4

SHA-1:
c3aeeaf16cd30ac3cd9ad56728db89ffa38ebdb3

SHA-256:
bfe5960314b5e1de80eaaee4421e398ffec21ddf8cbeef77e84ef0f45d3371e0

Scanner detections:
23 / 68

Status:
Adware

Analysis date:
4/26/2024 1:35:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.193768
601

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2015.06.13

Avira AntiVirus
ADWARE/Amonetize.616464.2
8.3.1.6

Arcabit
Trojan.Graftor.D2F4E8
1.0.0.425

avast!
Win32:Amonetize-JQ [PUP]
2014.9-150613

AVG
BundleApp
2016.0.3079

Baidu Antivirus
PUA.Win32.Amonetize
4.0.3.15613

Bitdefender
Gen:Variant.Graftor.193768
1.0.20.820

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.Amonetize.DCAW
22427

Dr.Web
Trojan.Amonetize.2248
9.0.1.0164

Emsisoft Anti-Malware
Gen:Variant.Graftor.193768
8.15.06.13.06

ESET NOD32
Win32/Amonetize.EZ potentially unwanted (variant)
9.11777

F-Secure
Gen:Variant.Graftor.193768
11.2015-13-06_7

G Data
Gen:Variant.Graftor.193768
15.6.25

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.1884

Malwarebytes
PUP.Optional.Amonetize
v2015.06.13.06

MicroWorld eScan
Gen:Variant.Graftor.193768
16.0.0.492

Panda Antivirus
PUP/Amonetize
15.06.13.06

Reason Heuristics
PUP.Amonitize.Installer
15.6.13.18

Sophos
Generic PUA MG
4.98

VIPRE Antivirus
Amonetize
41132

File size:
603.5 KB (618,000 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/23/2015 5:00:00 AM

Valid to:
2/24/2016 4:59:59 AM

Subject:
CN="LLC ""HALKON PLYUS""", O="LLC ""HALKON PLYUS""", STREET="Brody, house 60", L=Ternopil, S=Ternopilska, PostalCode=46010, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00DB146CEBBA591269C2AFDE437524C41C

File PE Metadata
Compilation timestamp:
6/9/2015 7:54:21 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:8fd1FX9hejHIjQC46M9uZkq3F1Zq6nhBaGPqHv2H0JNmu1facYVAqX:s6jKQCLND1Zqg76v2HwpYVV

Entry address:
0xA702

Entry point:
E8, 7B, 2B, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 08, AA, 37, 00, 85, C0, 75, 1D, E8, 76, 15, 00, 00, 6A, 1E, E8, CC, 15, 00, 00, 68, FF, 00, 00, 00, E8, 1E, 18, 00, 00, A1, 08, AA, 37, 00, 59, 59, 85, F6, 74, 04, 8B, CE, EB, 03, 33, C9, 41, 51, 6A, 00, 50, FF, 15, 64, 20, 37, 00, 8B, F8, 85, FF, 75, 26, 6A, 0C, 5B, 39, 05, 20, AD, 37, 00, 74, 0D, 56, E8, 62, 02, 00, 00, 59, 85, C0, 75, A9, EB, 07, E8, 77, 1F, 00, 00, 89, 18, E8, 70, 1F, 00, 00, 89, 18, 8B...
 
[+]

Code size:
67 KB (68,608 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-55-178.jfk6.r.cloudfront.net  (54.192.55.178:80)

TCP (HTTP):
Connects to server-54-192-55-154.jfk6.r.cloudfront.net  (54.192.55.154:80)

TCP (HTTP):
Connects to ec2-54-235-95-208.compute-1.amazonaws.com  (54.235.95.208:80)

Remove setup__2140_il37.exe - Powered by Reason Core Security