f_0004ad

Application Installer

Softonic International

The file f_0004ad by Softonic International has been detected as a potentially unwanted program by 8 anti-malware scanners. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from sd-cf.en.softonic.com and multiple other hosts.
Publisher:
Softonic International  (signed and verified)

Product:
Application Installer

Version:
1.41.10.4

MD5:
3400d64eac297effa6947109cc644c51

SHA-1:
3fe1771d944891e6930967206a6fbeef98155bb5

SHA-256:
d9b04c34d81d7afd79afa02c381559d474be621336e1f709120c2057129c7029

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 11:33:18 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.Siggen6.26583
9.0.1.0356

ESET NOD32
Win32/SoftonicDownloader (variant)
8.10907

G Data
Win32.Adware.Softonic
14.12.24

K7 AntiVirus
Unwanted-Program
13.188.14395

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.2758

Malwarebytes
PUP.Optional.Softonic
v2014.12.22.11

Reason Heuristics
Bundler.PPI.Softonic.I
14.12.22.11

VIPRE Antivirus
Softonic Downloader
35916

File size:
363.9 KB (372,584 bytes)

Product version:
1.41.10.4

Copyright:
Copyright (C) 2014

Language:
Spanish (Spain, International Sort)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\temp\webkit\cache\f_0004ad

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/2/2013 5:00:00 PM

Valid to:
10/2/2015 4:59:59 PM

Subject:
CN=Softonic International, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Softonic International, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
67C1FF44C765ABDA26027A6DCA52BA11

File PE Metadata
Compilation timestamp:
12/16/2014 7:00:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:rlxwD7Jxztn+EKSb0DodDx+TJgKjXVSfKGpKEdLUlQfJq6DuvJ5nemkvUboS4ir+:xxuJiBDcDmPrVCKGUXlQh3D6Jo2oS41b

Entry address:
0xFD830

Entry point:
60, BE, 00, E0, 4A, 00, 8D, BE, 00, 30, F5, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 3E, B9, 0F, 00, 57, 83, C3, 04, 53, 68, 22, F8, 04, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.9650  (probably packed)

Code size:
324 KB (331,776 bytes)

The file f_0004ad has been seen being distributed by the following 3 URLs.

Remove f_0004ad - Powered by Reason Core Security