1347com.talkatone.android.daroid.apk.exe

Contumar Empresarial s.l.

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application 1347com.talkatone.android.daroid.apk.exe by Contumar Empresarial s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Contumar Empresarial s.l.  (signed and verified)

MD5:
1d5d5a6f67e3a574f73390918beb87a3

SHA-1:
3c388f464c0acc9d6633c27a0ccf1ef164c0a3dd

SHA-256:
c5f8273992a356ac2fe650a029a3dc5c6f0525059ce62da0e33616119282d5e1

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/26/2025 6:15:43 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.Contumar (M)
16.3.13.15

File size:
678.1 KB (694,368 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\1347com.talkatone.android.daroid.apk.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
2/2/2015 2:00:38 PM

Valid to:
9/24/2016 4:00:25 PM

Subject:
CN=Contumar Empresarial s.l., O=Contumar Empresarial s.l., L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112119FE6AFB4FA7129F4F594CD3E07D5B21

File PE Metadata
Compilation timestamp:
6/18/2015 1:58:05 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:ZyE2QYrOLw9saOiCXcU/OQOCeDHg23sMhEJZT1aRYNg+6I:cE2QYrr6iwcWOQOfLg6sMCDT1a2a+6I

Entry address:
0x118B4

Entry point:
E8, 2F, 96, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, F8, DB, 42, 00, E8, F6, 56, 00, 00, E8, 2C, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, C2, 95, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, E9, 4C, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.6874

Code size:
141 KB (144,384 bytes)

The file 1347com.talkatone.android.daroid.apk.exe has been seen being distributed by the following URL.

Remove 1347com.talkatone.android.daroid.apk.exe - Powered by Reason Core Security