DownloadManager.exe

DownloadManager

Zulu Soft SRL

This is a bundle installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application DownloadManager.exe by Zulu Soft SRL has been detected as adware by 2 anti-malware scanners. It is also typically executed from the user's temporary directory.
Publisher:
Zulu Soft SRL  (signed and verified)

Product:
DownloadManager

Version:
1.0.0.0

MD5:
43c62ba156dea940dd797f6e83249985

SHA-1:
d1538be3b888751164501bfdd255a3a6477accf0

SHA-256:
8715d318adb915e82f11839db1acaa8f2e2cc3280207badf9a03d8cd38be06ab

Scanner detections:
2 / 68

Status:
Adware

Analysis date:
11/22/2024 9:10:07 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
MSIL/Soft32Downloader (variant)
8.9631

Reason Heuristics
PUP.ZuluSoftSRL.P
14.4.9.0

File size:
1.1 MB (1,184,816 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2013

Original file name:
DownloadManager.exe

File type:
Executable application (Win64 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\downloadmanager.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
6/4/2013 2:00:00 AM

Valid to:
6/18/2016 1:59:59 AM

Subject:
CN=Zulu Soft SRL, O=Zulu Soft SRL, L=Sibiu, S=Sibiu, C=RO, SERIALNUMBER=J32/987/2007, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RO

Issuer:
CN=Symantec Class 3 Extended Validation Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
22D4D7E5042BE9C2999CB05C4CA2BB4F

File PE Metadata
Compilation timestamp:
4/3/2014 2:35:34 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:oymirHbwo1Fo71Ic4YqdnDsElfKuMebRCmb7Qc8YkCzL2AqMLvjSgorfjkb:oymirHbworoxIchpuMekhlgzRqMDorfi

Entry address:
0x118362

Entry point:
4D, 5A, 90, 00, 03, 00, 00, 00, 04, 00, 00, 00, FF, FF, 00, 00, B8, 00, 00, 00, 00, 00, 00, 00, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 80, 00, 00, 00, 0E, 1F, BA, 0E, 00, B4, 09, CD, 21, B8, 01, 4C, CD, 21, 54, 68, 69, 73, 20, 70, 72, 6F, 67, 72, 61, 6D, 20, 63, 61, 6E, 6E, 6F, 74, 20, 62, 65, 20, 72, 75, 6E, 20, 69, 6E, 20, 44, 4F, 53, 20, 6D, 6F, 64, 65, 2E, 0D, 0D, 0A, 24, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Code size:
1.1 MB (1,139,712 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):

TCP (HTTP SSL):
Connects to vip011.ssl.hwcdn.net  (205.185.208.11:443)

TCP (HTTP SSL):
Connects to server-54-230-38-186.jfk1.r.cloudfront.net  (54.230.38.186:443)

TCP (HTTP SSL):
Connects to server-205-251-251-253.jfk5.r.cloudfront.net  (205.251.251.253:443)

TCP (HTTP SSL):
Connects to ec2-54-225-185-120.compute-1.amazonaws.com  (54.225.185.120:443)

TCP (HTTP SSL):
Connects to ec2-50-17-202-227.compute-1.amazonaws.com  (50.17.202.227:443)

TCP (HTTP SSL):
Connects to ec2-107-22-211-232.compute-1.amazonaws.com  (107.22.211.232:443)

TCP (HTTP SSL):
Connects to bam-5.nr-data.net  (50.31.164.175:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-13-165-163.deploy.static.akamaitechnologies.com  (23.13.165.163:80)

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

Remove DownloadManager.exe - Powered by Reason Core Security