flashplayer_v.160073670c.exe

TUGUU SL

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application flashplayer_v.160073670c.exe by TUGUU SL has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. With this installer, users are expecting to download the free Adobe Flash Player but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
TUGUU SL  (signed and verified)

MD5:
63a35618d52b6710f1d8c7e1cdf5afc6

SHA-1:
2b9a6a755f72ecf8c40932399e864d2221f82d2e

SHA-256:
2c281b2ff1f000ef164281bc9bf21246622700ee4683d3dc75cef6dae1b29160

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Uses the InstallIQ download installer to bundle various adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 12:54:38 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
Win-PUP/DomaIQ.Gen
2015.10.06

Avira AntiVirus
PUA/DomaIQ.Gen7
8.3.2.2

avast!
NSIS:DomaIQ-C [PUP]
2014.9-151101

AVG
Agent.L
2016.0.2939

Bkav FE
W32.HfsAdware
1.3.0.7237

Comodo Security
Application.Win32.DomaIQ.~l
23364

Dr.Web
Adware.W3i.29
9.0.1.0305

ESET NOD32
Win32/DomaIQ.L potentially unwanted
9.12362

G Data
Win32.Application.DomalQ
15.11.25

IKARUS anti.virus
PUA.DomaIQ
t3scan.1.9.5.0

K7 AntiVirus
Trojan
13.210.17437

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.1189

Malwarebytes
PUP.FakeFlash.DomaIQ
v2015.11.01.03

McAfee
Artemis!63A35618D52B
5600.6595

NANO AntiVirus
Trojan.Win32.Generic.cthglr
0.30.26.3725

Panda Antivirus
PUP/MultiToolbar.A
15.11.01.03

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Quick Heal
AdWare.MSIL.r3 (Not a Virus)
11.15.14.00

Reason Heuristics
PUP.Tuguu.Bundler (M)
15.11.1.3

Rising Antivirus
PE:Malware.RDM.37!5.2B[F1]
23.00.65.151030

Sophos
DomaIQ pay-per install (PUA)
4.98

SUPERAntiSpyware
PUP.DomalIQ/Variant
9535

Total Defense
Win32/DomaIQ.F
37.1.62.1

Trend Micro House Call
TROJ_SPNR.38JH13
7.2.305

Trend Micro
TROJ_SPNR.38JH13
10.465.01

VIPRE Antivirus
DomaIQ
44326

Zillya! Antivirus
Adware.DomaIQ.Win32.613
2.0.0.2429

File size:
404.6 KB (414,352 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\flashplayer_v.160073670c.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
5/3/2013 1:24:02 PM

Valid to:
5/3/2014 1:24:02 PM

Subject:
CN=TUGUU SL, O=TUGUU SL, L=Adeje, S=Santa Cruz de Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
2776B257979F9A

File PE Metadata
Compilation timestamp:
12/5/2009 5:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:xuAjam6PzrRkFyFh3ZJvnLQpVJZWjwEa5ZWs:xFjamWVbZO6DI1

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9367

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file flashplayer_v.160073670c.exe has been seen being distributed by the following 2 URLs.

Remove flashplayer_v.160073670c.exe - Powered by Reason Core Security