00000000

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The file 00000000 by Somoto has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Somoto BetterInstaller installer. The file has been seen being downloaded from www.cinehdfilmes.com.
Publisher:
Somoto Ltd.  (signed and verified)

MD5:
7936ca3733a8993932d3f3617d42e93f

SHA-1:
295964139ca8b3ca59de68a5bbae5b16adef05d7

SHA-256:
d29f1d9f8c1cf7454aea93486c8265ba9281f21073116a201080221b2cdc3cc0

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/28/2024 6:41:04 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Somoto.Bundler (M)
15.6.29.10

File size:
220 KB (225,280 bytes)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\appdata\local\google\chrome\user data\default\file system\003\t\00\00000000

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/2/2014 2:00:00 AM

Valid to:
7/3/2015 1:59:59 AM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
6A0C39D0252522A9C448352858ACAACB

File PE Metadata
Compilation timestamp:
12/17/2010 10:14:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
6144:aA0m3D0oxttW7dGDQbp+nkWwG28YxPnbprEum/Fau:aA0iD0oAbpqRY5b2x/F3

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Code size:
28.5 KB (29,184 bytes)

The file 00000000 has been seen being distributed by the following URL.

Remove 00000000 - Powered by Reason Core Security