drfone-for-androidfull1464exe.exe

Protected Downloader

Zugara Investments Limited

The application drfone-for-androidfull1464exe.exe, “Protected Downloader Setup ” by Zugara Investments Limited has been detected as adware by 8 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. The installer uses the InstallMonetizer platform which will donwload and install adware toolbars and other potentially unwanted software offers during setup. The file has been seen being downloaded from filemonetizer.com and multiple other hosts.
Publisher:
Zugara Investments Limited   (signed by Zugara Investments Limited)

Product:
Protected Downloader

Description:
Protected Downloader Setup

MD5:
6d33157503902f80c079951d2acfe6cb

SHA-1:
d6a12d4523e7b09ff18ec20d6aaaae3fbdfab202

SHA-256:
662a8d772b188bbdd24656642f440b1526aa609fb533b34731dc6624b8a29731

Scanner detections:
8 / 68

Status:
Adware

Explanation:
Uses the InstallMonetizer distribution platform to bundle adware.

Analysis date:
11/23/2024 5:16:47 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/Zugara.boeb
7.11.215.110

AVG
Zugara
2016.0.3077

Dr.Web
Adware.Downware.6417
9.0.1.068

G Data
Win32.Adware.Zugara
15.3.24

herdProtect (fuzzy)
2015.6.15.15

IKARUS anti.virus
AdWare.Win32.InstallMonetizer
t3scan.1.8.3.0

Malwarebytes
PUP.Optional.Downloader
v2015.03.09.12

Reason Heuristics
PUP.Installer.ZugaraInvestments
15.3.9.12

File size:
1.1 MB (1,158,256 bytes)

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\drfone-for-androidfull1464exe.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/9/2014 5:00:00 PM

Valid to:
7/10/2015 4:59:59 PM

Subject:
CN=Zugara Investments Limited, O=Zugara Investments Limited, STREET=Naousis 1, STREET="Karapatakis Building, Suite 2, 4th floor", L=Larnaca, S=Larnaca, PostalCode=6018, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0F61CE2AF8431A752FBA5F8EC235BDB0

File PE Metadata
Compilation timestamp:
1/30/2013 6:21:56 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:ixGj2YKWgEWtucnw6Fq1ejTdnJQArKn+qXjYIJlMux8eaJOPKlsMJ:H7ZgEWMv6WeEP+qzYIJlMG8dhKA

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.9152

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file drfone-for-androidfull1464exe.exe has been seen being distributed by the following 2 URLs.

Remove drfone-for-androidfull1464exe.exe - Powered by Reason Core Security