atube catcher.exe

Eilio Developments, s.l.

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application atube catcher.exe by Eilio Developments, s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Eilio Developments, s.l.  (signed and verified)

MD5:
4c0ca3896f3fdf8be6ea5d3a0932c8b0

SHA-1:
3e3c462c63daebb52ac54b46d46da7f8d37bfdb0

SHA-256:
fc493ef428c3f5404b830582ee66232d7cd2691bb46bad7c30caed88d0a921b8

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 12:39:33 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
17.3.14.21

File size:
514.1 KB (526,432 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\atube catcher.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/24/2014 9:00:00 PM

Valid to:
7/24/2017 8:59:59 PM

Subject:
CN="Eilio Developments, s.l.", O="Eilio Developments, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0EF8CB39AB15607AB4EF554EB245AFB1

File PE Metadata
Compilation timestamp:
3/28/2015 4:35:00 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

Entry address:
0xC1DC

Entry point:
E8, 5B, 4D, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 08, 1B, 42, 00, E8, 3E, 15, 00, 00, E8, 2C, 4F, 00, 00, 0F, B7, F0, 6A, 02, E8, EE, 4C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 89, 42, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
98 KB (100,352 bytes)

The file atube catcher.exe has been seen being distributed by the following URL.

http://get.dubdownmanage.com/sb/n/.../aTube Catcher.exe

Remove atube catcher.exe - Powered by Reason Core Security