videoplayer_downloader_by_videoplayer.exe

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The application videoplayer_downloader_by_videoplayer.exe, “Powered by BetterInstaller” by Somoto has been detected as adware by 26 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. Includes the Somoto BetterInstaller, an adware installer that will bundle offers for additional third party applications, mostly adware toolbars, with legitimate softare and may be installed without adequate user consent.
Publisher:
Somoto Ltd.  (signed and verified)

Description:
Powered by BetterInstaller

Version:
2.0.0.0

MD5:
5423049c0be0b64dd47e76f4552912c0

SHA-1:
29c342f4d21d5eba7a625cfd96d840518da5080b

SHA-256:
35054483338941b57aa4173ac26c09e843ee6a3baeeff9a0a112f93f82ee962f

Scanner detections:
26 / 68

Status:
Adware

Explanation:
Uses the Somoto 'BetterInstaller' to bundle additional (unwanted) software during install without adequate consent.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/25/2024 7:44:07 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Somoto.A
1018

Agnitum Outpost
PUA.Somoto
7.1.1

Avira AntiVirus
APPL/Somoto.Gen2
7.11.132.242

avast!
Win32:PUP-gen [PUP]
2014.9-140224

AVG
AdInstaller.Somoto
2015.0.3554

Bitdefender
Application.Bundler.Somoto.A
1.0.20.565

Bkav FE
W32.Clod2bd.Trojan
1.3.0.4924

Clam AntiVirus
Adware.Somoto-1
0.98/18355

Comodo Security
Application.Win32.Somoto.A
17818

Dr.Web
Adware.Somoto.17
9.0.1.055

ESET NOD32
Win32/Somoto
8.9449

F-Prot
W32/SomotoBetterInstaller.A
v6.4.7.1.166

F-Secure
Application.Bundler.Somoto
11.2014-23-04_4

G Data
Application.Bundler.Somoto
14.4.24

K7 AntiVirus
Unwanted-Program
13.176.11226

Kaspersky
not-a-virus:Downloader.NSIS.Agent
14.0.0.4263

Malwarebytes
PUP.Optional.Somoto
v2014.02.24.11

MicroWorld eScan
Application.Bundler.Somoto.A
15.0.0.339

NANO AntiVirus
Trojan.Win32.Agent.cruvdt
0.28.0.57630

Panda Antivirus
PUP/MultiToolbar.A
14.02.24.11

Reason Heuristics
PUP.BetterInstaller.Somoto.f
14.8.7.17

Sophos
Somoto BetterInstaller
4.97

SUPERAntiSpyware
Adware.Somoto/Variant
10764

Trend Micro House Call
TROJ_GEN.R0CBB01AI14
7.2.55

Vba32 AntiVirus
Downloader.Agent
3.12.24.3

VIPRE Antivirus
BetterInstaller
26670

File size:
162.7 KB (166,568 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Language:
Language Neutral

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/20/2011 4:00:00 AM

Valid to:
9/20/2014 3:59:59 AM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., STREET=PO Box 58096, L=Tel Aviv, S=--, PostalCode=61580, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00841D099D16B738F34172FEEFE1D2574F

File PE Metadata
Compilation timestamp:
12/17/2010 1:14:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:a22ihA0m3BJf0vccVecSqbnoNu5ae48AhS9D3iE18UPzodn3F1:1A0m3T0vcAedq7jYF8P3iAvUdV1

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.6003

Code size:
28.5 KB (29,184 bytes)

The file videoplayer_downloader_by_videoplayer.exe has been seen being distributed by the following URL.

Remove videoplayer_downloader_by_videoplayer.exe - Powered by Reason Core Security