file_downloader.exe

XXXVI-II evito

Popeler System, s.l.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application file_downloader.exe, “parum atavus ullus erepo” by Popeler System, s.l has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
proprius habeo  (signed by Popeler System, s.l.)

Product:
XXXVI-II evito

Description:
parum atavus ullus erepo

Version:
53.69.18.45

MD5:
4a3546099b09405681a1164628fd74dc

SHA-1:
45ceeaddb085356966ef15ab65fa92252a9233e8

SHA-256:
596cfaa26f6e136fcae3c07272d361da7a27c51aa4bd633d2ce9d13a0073aa56

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/28/2024 10:25:19 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Kazy.132995
813

Agnitum Outpost
PUA.Solimba
7.1.1

AhnLab V3 Security
PUP/Win32.Solimba
2014.10.11

Avira AntiVirus
APPL/Firseria.Gen8
7.11.177.146

avast!
Win32:Adware-gen [Adw]
2014.9-141113

AVG
Adware BundleApp_r.AV
2014.0.4189

Baidu Antivirus
Adware.MSIL.Solimba
4.0.3.141113

Bitdefender
Gen:Variant.Application.Bundler.Kazy.132995
1.0.20.1585

Comodo Security
Application.Win32.Solimba.LSW
19759

Dr.Web
Adware.Downware.8763
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.Kazy.132995
14.11.13

ESET NOD32
MSIL/Solimba.AH potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Morstars
11/13/2014

F-Prot
W32/A-a1e0d357
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Bundler
11.2014-13-11_5

G Data
Gen:Variant.Application.Bundler.Kazy.132995
14.11.24

K7 AntiVirus
Unwanted-Program
13.184.13704

Kaspersky
not-a-virus:Downloader.Win32.Morstar
15.0.0.494

Malwarebytes
PUP.Optional.FirSeria
v2014.11.13.10

MicroWorld eScan
Gen:Variant.Application.Bundler.Kazy.132995
15.0.0.951

NANO AntiVirus
Trojan.Win32.Morstar.dglqkb
0.28.2.62483

Panda Antivirus
Adware/Firseria
14.11.13.10

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Adware.Firseria.A5
11.14.14.00

Reason Heuristics
PUP.PopelerSystemsl.P
14.11.13.22

Sophos
Solimba Installer
4.98

SUPERAntiSpyware
PUP.Morstar/Variant
10239

Vba32 AntiVirus
Downware.Morstar
3.12.26.3

VIPRE Antivirus
Threat.4150696
33706

Zillya! Antivirus
Downloader.Morstar.Win32.140
2.0.0.1958

File size:
538.8 KB (551,680 bytes)

Product version:
83.17.46.49

Copyright:
Copyright procella audacia privatus olim

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\file_downloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/25/2014 7:00:00 AM

Valid to:
9/23/2017 6:59:59 AM

Subject:
CN="Popeler System, s.l.", O="Popeler System, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
31167DADB03384BDCA4981DE407B4CB5

File PE Metadata
Compilation timestamp:
10/9/2014 9:12:34 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:98bT2Yo4ncbn14e/TaHvNhn1fwBlY5hJShr1UNgMfutGJ3gn9NEi:98bqYo4ncbL/TA1fwbQmhJUN083M5

Entry address:
0xDE9C

Entry point:
E8, A5, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 28, 6E, 42, 00, E8, FE, 15, 00, 00, E8, 76, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 38, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 01, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7095

Packer / compiler:
PEQuake V0.06

Code size:
113.5 KB (116,224 bytes)

The file file_downloader.exe has been seen being distributed by the following URL.

Remove file_downloader.exe - Powered by Reason Core Security