flvplayer_downloader-ndgf1icbf.exe

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The application flvplayer_downloader-ndgf1icbf.exe by Somoto has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Somoto BetterInstaller installer. The file has been seen being downloaded from www.buscamusicas.net.
Publisher:
Somoto Ltd.  (signed and verified)

MD5:
e4b3a379ee5e9db8ab43f0454c10bc90

SHA-1:
7aa9ef0d0d301e46bfbf8a72292cee839362a851

SHA-256:
ed623dfd981a4bf21573753453e343bee3cf044eb1977c3b945334da75e6fa13

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 4:03:26 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Somoto.Bundler (M)
16.2.20.16

File size:
220 KB (225,288 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\downloads\flvplayer_downloader-ndgf1icbf.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/2/2014 7:00:00 AM

Valid to:
7/3/2015 6:59:59 AM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
6A0C39D0252522A9C448352858ACAACB

File PE Metadata
Compilation timestamp:
12/17/2010 4:14:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:x22ihA0m3BJX0oH2zrUXc1eoUIwDjwQefRu+czKSxXVeyblXBDTJDMWNOPWoLG7U:SA0m3D0oB/oQjwQeut2G8obnpWLGgAa

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.7521  (probably packed)

Code size:
28.5 KB (29,184 bytes)

The file flvplayer_downloader-ndgf1icbf.exe has been seen being distributed by the following URL.

Remove flvplayer_downloader-ndgf1icbf.exe - Powered by Reason Core Security