whatsapp.exe

VI-II ludio

Eilio Developments sl

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application whatsapp.exe by Eilio Developments sl has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
didico conscientia argumentum meretrix  (signed by Eilio Developments sl)

Product:
VI-II ludio

Description:
eligo causa

Version:
82.68.2.93

MD5:
288eef8962b6e613daa00e4fed2c22b6

SHA-1:
73ebc7f87443fb999710a82b8415dd01acaf48c0

SHA-256:
34f9911cd9a5e00f14a8bb0400b6bb3830a0db12a7631ee8195f0bc139b242a2

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/27/2024 3:55:27 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.EilioDev (M)
16.7.6.21

File size:
580.1 KB (593,992 bytes)

Product version:
95.40.66.14

Copyright:
2014 adeptio votum deputo

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\whatsapp.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
7/28/2014 11:17:10 AM

Valid to:
7/28/2016 11:17:10 AM

Subject:
CN=Eilio Developments sl, O=Eilio Developments sl, L=Barcelona, C=ES

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11218832573D4BDD488A310AF2AC15B41F25

File PE Metadata
Compilation timestamp:
11/19/2014 8:42:40 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:JJ3tNshx4l7T2evIuERJsWNAWy+rqt9+6eRtxGmVPojae9C:JJ3ghA7TTvIuMnkSz9VAeJ

Entry address:
0xD9CC

Entry point:
E8, B5, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 08, 72, 42, 00, E8, 0E, 16, 00, 00, E8, 86, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 48, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 11, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
112.5 KB (115,200 bytes)

The file whatsapp.exe has been seen being distributed by the following URL.

Remove whatsapp.exe - Powered by Reason Core Security