setup_v2.exe

Tuguu S.L

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application setup_v2.exe by Tuguu S.L has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the TUGUU DomaIQ Setup installer.
Publisher:
Tuguu S.L  (signed and verified)

MD5:
0aa192d369cc59c20eff6f64ebc5f3f7

SHA-1:
dfd5221f76750b2b35eee45ae78f5a653e35762e

SHA-256:
5e40d26d293b1e1327524c7c79e5a9965110cacadfac135c9f4f8ddc64c1223e

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles third-party components such as adware in the installer.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
5/16/2024 3:49:48 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Tuguu.TuguuSL.Bundler (M)
16.1.23.2

File size:
327.5 KB (335,344 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\setup_v2.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
12/3/2013 4:13:51 PM

Valid to:
12/4/2014 4:13:51 PM

Subject:
E=victor.camacho@tuguu.com, CN=Tuguu S.L, O=Tuguu S.L, L=Adeje, S=Tenerife, C=ES

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121111958C6091E136AAD058195A273968F

File PE Metadata
Compilation timestamp:
6/30/2014 11:28:36 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:hIWbEGsxdTGzTb1P6LG/J9hS14sCIFQwaEyUNxYrYBei6CiYwB:hISEGsx68LG/J9h1sQuxYrQUC+B

Entry address:
0x2F35

Entry point:
B8, 7C, 05, 4D, 00, 50, 64, FF, 35, 00, 00, 00, 00, 64, 89, 25, 00, 00, 00, 00, 33, C0, 89, 08, 6D, 61, 6E, 71, 75, 65, 64, 69, 63, 65, 00, 64, 35, A0, F9, BD, 67, CF, 11, A4, 55, D5, D9, 76, 6D, E9, 3F, 09, 58, EA, 01, 3C, 8C, 97, DE, 61, A1, 3B, 47, 90, 96, 98, 61, 4F, D5, 53, 93, 83, 9D, 33, 4E, 0E, 5A, 45, 2C, 19, 5C, D1, DC, 8F, 77, 6B, A5, 22, BC, 66, 02, 69, 7E, CD, 31, E5, E3, 0E, BC, A6, 38, B0, 45, F3, BF, 29, B1, 5B, 53, C6, 75, 3D, 8E, C6, C1, AF, 85, 66, 47, 4A, 40, 1D, 29, 9E, 0E, 43, E5, CB...
 
[+]

Code size:
100 KB (102,400 bytes)

The file setup_v2.exe has been seen being distributed by the following URL.

Remove setup_v2.exe - Powered by Reason Core Security