setup_362.exe

Pitaya Tech Ltd

The application setup_362.exe by Pitaya Tech has been detected as adware by 21 anti-malware scanners. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from dfe8370a2961598fcf36-78e3d3d82d3ad0a3905742af01c7c45f.r91.cf5.rackcdn.com and multiple other hosts.
Publisher:
Pitaya Tech Ltd  (signed and verified)

MD5:
a44ac4e7a246561a4300e286addfaed0

SHA-1:
cd5c5437f96b818bcf11fc4647c96e30c901a4b1

SHA-256:
ae2e3d4ea7803e59ee5dd149821741f0fa01789f4b308f527064dc2befc9b78e

Scanner detections:
21 / 68

Status:
Adware

Analysis date:
4/27/2024 10:41:30 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.461155
786

Agnitum Outpost
Trojan.DL.Agent
7.1.1

AVG
Generic
2015.0.3264

Bitdefender
Gen:Variant.Kazy.461155
1.0.20.1725

Dr.Web
Trojan.DownLoader11.40958
9.0.1.0340

Emsisoft Anti-Malware
Gen:Variant.Kazy.461155
8.14.12.11.12

ESET NOD32
Win32/Toolbar.BitCocktail (variant)
8.10727

Fortinet FortiGate
W32/Agent.HEXG!tr.dldr
12/11/2014

F-Secure
Gen:Variant.Kazy.461155
11.2014-11-12_5

G Data
Gen:Variant.Kazy.461155
14.12.24

herdProtect (fuzzy)
2014.12.6.12

IKARUS anti.virus
not-a-virus:Downloader.Agent
t3scan.1.7.8.0

Kaspersky
Trojan-Downloader.Win32.Agent
14.0.0.2815

McAfee
Artemis!2AF27D1CE67F
5600.6925

MicroWorld eScan
Gen:Variant.Kazy.461155
15.0.0.1035

nProtect
Trojan-Downloader/W32.Agent.266064
14.09.29.01

Panda Antivirus
Trj/Genetic.gen
14.12.06.07

Reason Heuristics
PUP.Installer.PitayaTech.J
14.12.11.23

Sophos
V-Bates
4.98

Trend Micro House Call
Suspicious_GEN.F47V1111
7.2.340

Zillya! Antivirus
Downloader.Agent.Win32.221388
2.0.0.1938

File size:
261.8 KB (268,088 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\setup_362.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/21/2014 8:00:00 PM

Valid to:
9/22/2015 7:59:59 PM

Subject:
CN=Pitaya Tech Ltd, O=Pitaya Tech Ltd, STREET=Rakefet 19, L=Hod Hasharon, S=Sharon, PostalCode=4510034, C=IL

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
6FAC939FE352559AD7790E9C81C9A639

File PE Metadata
Compilation timestamp:
9/22/2014 8:54:59 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:2NURUAhIb3zPSr372TvT+Cab4/ZChW3w0pUPZ60msnru+vikMPLdKfoIW7d/mR:2GRKb3jS77mb7ChW3wKkGdW

Entry address:
0x9133

Entry point:
E8, A4, 94, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 70, 56, 42, 00, E8, 97, 52, 00, 00, E8, 30, 29, 00, 00, 0F, B7, F0, 6A, 02, E8, 37, 94, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 38, 50, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
5.4939

Code size:
114.5 KB (117,248 bytes)

The file setup_362.exe has been seen being distributed by the following 2 URLs.

Remove setup_362.exe - Powered by Reason Core Security