evasi0n7win103_downloader_by_evasi0n7win103.exe

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The application evasi0n7win103_downloader_by_evasi0n7win103.exe, “Powered by BetterInstaller” by Somoto has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. Includes the Somoto BetterInstaller, an adware installer that will bundle offers for additional third party applications, mostly adware toolbars, with legitimate softare and may be installed without adequate user consent.
Publisher:
Somoto Ltd.  (signed and verified)

Description:
Powered by BetterInstaller

Version:
2.0.0.0

MD5:
edbb29aa79cd0307f838a68ac7d1552a

SHA-1:
7324b19a6384083ed2b0c65200b757ea661a2676

SHA-256:
9741b796f081beb1cad49c8c932628f9e1aea6e6de7b285878ed7d5e57b5798a

Scanner detections:
24 / 68

Status:
Adware

Explanation:
Uses the Somoto 'BetterInstaller' to bundle additional (unwanted) software during install without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 7:06:14 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Somoto
7.1.1

AhnLab V3 Security
PUP/Win32.BetterInstaller
2014.02.04

Avira AntiVirus
APPL/Somoto.Gen2
7.11.128.254

avast!
Win32:PUP-gen [PUP]
2014.9-140205

AVG
AdInstaller.Somoto
2015.0.3572

Baidu Antivirus
HackTool.Win32.Downloader
4.0.3.1425

Clam AntiVirus
Adware.Somoto-1
0.98/18355

Comodo Security
Application.Win32.Somoto.A
17727

Dr.Web
Adware.Somoto.17
9.0.1.036

ESET NOD32
Win32/Somoto
8.9377

F-Prot
W32/SomotoBetterInstaller.A
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.175.11046

Kaspersky
not-a-virus:Downloader.NSIS.Agent
14.0.0.4355

Malwarebytes
PUP.Optional.Somoto
v2014.02.05.09

McAfee
Artemis!EDBB29AA79CD
5600.7228

NANO AntiVirus
Trojan.Win32.Agent.cruvdt
0.28.0.57630

Panda Antivirus
Adware/MultiToolbar
14.02.05.09

Qihoo 360 Security
Win32/Virus.Downloader.c73
1.0.0.1015

Reason Heuristics
PUP.BetterInstaller.Somoto.l
14.8.7.17

Sophos
Somoto BetterInstaller
4.97

SUPERAntiSpyware
Adware.Somoto/Variant
10801

Trend Micro House Call
TROJ_GEN.R01TB01AL14
7.2.36

Vba32 AntiVirus
Downloader.Agent
3.12.24.3

VIPRE Antivirus
BetterInstaller
26120

File size:
160.9 KB (164,784 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\evasi0n7win103_downloader_by_evasi0n7win103.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/20/2011 5:30:00 AM

Valid to:
9/20/2014 5:29:59 AM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., STREET=PO Box 58096, L=Tel Aviv, S=--, PostalCode=61580, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00841D099D16B738F34172FEEFE1D2574F

File PE Metadata
Compilation timestamp:
12/17/2010 2:44:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:f22ihA0m3BJf0vSK0VESVJBfsookkNkrlR3vRrBkPMNqxo/1SI:QA0m3T0vSVVESvsniTvRruPMNyodSI

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.5954

Code size:
28.5 KB (29,184 bytes)

The file evasi0n7win103_downloader_by_evasi0n7win103.exe has been seen being distributed by the following 2 URLs.