ds.daemon.slave.04.namaiki.akuma.shimai.kousoku.choukyou__7818_i972874344_il98197.exe

TEHSNABSTROY LLC

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application ds.daemon.slave.04.namaiki.akuma.shimai.kousoku.choukyou__7818_i972874344_il98197.exe by TEHSNABSTROY has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
TEHSNABSTROY LLC  (signed and verified)

Version:
1.1.5.27

MD5:
34f193f5438fc9ae82deabb97520f6bd

SHA-1:
a8d3e11a0394364bf7e2f7293d6f425b691e9bb3

SHA-256:
5ed904a3cfdaaa0d5109e1ec28f9eec062b994f7b9dc8d7bcc6ba4c571514dd6

Scanner detections:
15 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/25/2024 2:01:39 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Amonetiz
2014.07.01

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.157.186

avast!
Win32:Amonetize-BZ [PUP]
2014.9-140630

AVG
BundleApp_r.R
2015.0.3427

ESET NOD32
Win32/Amonetize.BD (variant)
8.10021

Fortinet FortiGate
Riskware/Amonetize
6/30/2014

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize
14.0.0.3632

Malwarebytes
PUP.Optional.Amonetize
v2014.06.30.12

McAfee
Artemis!34F193F5438F
5600.7083

NANO AntiVirus
Riskware.Win32.Amonetize.dbosfv
0.28.0.60475

Qihoo 360 Security
Win32/Virus.Adware.932
1.0.0.1015

Reason Heuristics
PUP.Installer.TEHSNABSTROY.?
14.7.3.1

Sophos
Amonetize
4.98

Trend Micro House Call
Suspicious_GEN.F47V0630
7.2.181

VIPRE Antivirus
Amonetize
30814

File size:
337.5 KB (345,560 bytes)

Product version:
1.1.5.27

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\appdata\local\temp\ds.daemon.slave.04.namaiki.akuma.shimai.kousoku.choukyou__7818_i972874344_il98197.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/19/2014 3:00:00 AM

Valid to:
6/20/2015 2:59:59 AM

Subject:
CN=TEHSNABSTROY LLC, O=TEHSNABSTROY LLC, STREET="UL. NIKOLYAMSKAYA, 9", L=G. MOSKVA, S=G. MOSKVA, PostalCode=109240, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F4B1A67457808CFF0300CD93C4050F05

File PE Metadata
Compilation timestamp:
6/30/2014 8:13:03 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:iK/JDztRUotdv7+VlN7kB26o42xwerlkR7USb6PQG+O/NK2ECDRc5y:iK/JDZC+dvSVlN7826HzUa6PLYK+M

Entry address:
0x28146

Entry point:
E8, 32, A0, 00, 00, E9, 89, FE, FF, FF, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F, 85, C1, 00, 00, 00...
 
[+]

Code size:
236.5 KB (242,176 bytes)

The file ds.daemon.slave.04.namaiki.akuma.shimai.kousoku.choukyou__7818_i972874344_il98197.exe has been seen being distributed by the following 4 URLs.

http://dl-gate.net/?id=p191&sub=ar&name=File.Download&nor=1&subid=8507015416