file_downloader.exe

Eilio Developments, s.l.

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application file_downloader.exe by Eilio Developments, s.l has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Eilio Developments, s.l.  (signed and verified)

MD5:
60a3740a59a3e2db49c6e6c86b206a66

SHA-1:
d79cc949eb0d300d2720bd3e5af589bcff8f9db3

SHA-256:
2096c2df6e9c9dceb5f7836172c330d660f2382ebfc1089a5d7d59ea67751655

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/27/2024 4:28:29 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
16.8.3.19

File size:
514.1 KB (526,432 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\Pictures\one direction\file_downloader.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/25/2014 2:00:00 AM

Valid to:
7/25/2017 1:59:59 AM

Subject:
CN="Eilio Developments, s.l.", O="Eilio Developments, s.l.", L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0EF8CB39AB15607AB4EF554EB245AFB1

File PE Metadata
Compilation timestamp:
3/28/2015 8:35:00 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:ffv/cSGxdtQnvIIR40X7+u0Zpk2JjAUd19nVRk+:fn/cSa3QAIRRL30x0Ur9no+

Entry address:
0xC1DC

Entry point:
E8, 5B, 4D, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 08, 1B, 42, 00, E8, 3E, 15, 00, 00, E8, 2C, 4F, 00, 00, 0F, B7, F0, 6A, 02, E8, EE, 4C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 89, 42, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7304  (probably packed)

Code size:
98 KB (100,352 bytes)

The file file_downloader.exe has been seen being distributed by the following URL.

Remove file_downloader.exe - Powered by Reason Core Security