counter-strike-condition-zero.exe

FITDownloader

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application counter-strike-condition-zero.exe by FITDownloader has been detected as adware by 19 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from d13dhn7ldhrcf6.cloudfront.net and multiple other hosts.
Publisher:
FITDownloader  (signed and verified)

MD5:
fd5da4e9c2fb29830cd5ab91f4c3760d

SHA-1:
dfd30383bcd97689059f7d386493111682f57e9a

SHA-256:
e2bcbff81f182d81084eff3dd032fdb3f90f3f7faef4cc7114ecb2a97859f1e5

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/28/2024 2:19:33 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.179.100

AVG
InstallCore
2016.0.2985

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15916

Comodo Security
ApplicUnwnt
21424

Dr.Web
Adware.InstallCore.464
9.0.1.0259

ESET NOD32
Win32/InstallCore.QC (variant)
9.10580

Fortinet FortiGate
Riskware/InstallCore
9/16/2015

F-Prot
W32/InstallCore.AC.gen
v6.4.7.1.166

herdProtect (fuzzy)
2015.11.18.5

K7 AntiVirus
Unwanted-Program
13.184.13718

Malwarebytes
v2015.09.16.11

McAfee
Artemis!FD5DA4E9C2FB
5600.6641

NANO AntiVirus
Riskware.Win32.InstallCore.dgyidg
0.30.0.296

Reason Heuristics
PUP.installCore.FITDownloader (M)
15.9.16.11

Trend Micro House Call
TROJ_GEN.R047C0OKA14
7.2.259

Trend Micro
TROJ_GEN.R047C0OKA14
10.465.16

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
34010

File size:
733.6 KB (751,216 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\counter-strike-condition-zero.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/28/2014 7:00:00 AM

Valid to:
4/29/2015 6:59:59 AM

Subject:
CN=FITDownloader, O=FITDownloader, STREET=28 Lenelblome St., L=Tel-Aviv, S=Israel, PostalCode=651307, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
5E0816C139E8D20E76830D3D9638C4FE

File PE Metadata
Compilation timestamp:
6/20/1992 5:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:WfDvpcbQEHesKOXn6Yjd8WeGcNXOj0cawka10CuR95oCKU1R3mhIH6aUeS5OErIZ:WfDvChesjqYJ8WaA0xakp3KUflVUeS5m

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8812

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file counter-strike-condition-zero.exe has been seen being distributed by the following 2 URLs.

Remove counter-strike-condition-zero.exe - Powered by Reason Core Security