howtomakemoneyonfiverr$4000permonth__6817_il2002936.exe

The application howtomakemoneyonfiverr$4000permonth__6817_il2002936.exe has been detected as a potentially unwanted program by 22 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer, however the file is not signed with an authenticode signature from a trusted source. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Version:
1.1.6.20

MD5:
43da48ea5d4c508c9c9e108bdc4e7f40

SHA-1:
b67e4c382ee650a070a4578eba39515215ebfc5b

SHA-256:
3ec61e28c19cd0c500c40dcd1e198585b73aadfc2ee1e272b2663195674c1b56

Scanner detections:
22 / 68

Status:
Potentially unwanted

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 1:21:58 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.11
881

AhnLab V3 Security
PUP/Win32.Amonetize
2014.08.14

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.167.76

avast!
Win32:Amonetize-CV [PUP]
2014.9-140907

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.1497

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.11
1.0.20.1250

Dr.Web
Adware.Downware.6861
9.0.1.0250

ESET NOD32
Win32/Amonetize.BK (variant)
8.10254

Fortinet FortiGate
Riskware/Amonetize
9/7/2014

F-Secure
Gen:Variant.Application.Bundler
11.2014-07-09_1

G Data
Gen:Variant.Application.Bundler.Amonetize.11
14.9.24

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.3288

Malwarebytes
PUP.Optional.Amonetize
v2014.09.07.11

McAfee
RDN/Generic PUP.x!clg
5600.7015

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.11
15.0.0.750

NANO AntiVirus
Riskware.Win32.Amonetize.ddppzt
0.28.2.61519

Panda Antivirus
Trj/Chgt.B
14.09.07.11

Qihoo 360 Security
Win32/Application.639
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.9.7.11

Sophos
Generic PUA LG
4.98

Trend Micro House Call
Suspicious_GEN.F47V0808
7.2.250

VIPRE Antivirus
Trojan.Win32.Generic
32206

File size:
558.5 KB (571,904 bytes)

Product version:
1.1.6.20

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Language:
English (United States)

Common path:
C:\users\{user}\downloads\howtomakemoneyonfiverr$4000permonth__6817_il2002936.exe

File PE Metadata
Compilation timestamp:
8/8/2014 11:04:06 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:lQc3OvyV6fBDm7gOWwQibZmAEF3GIzHAmQU7AixXBMqWJz5vBKQIzUdot7U9M/5:n3BRbwAixxMHJ1CzUdi7U9M/

Entry address:
0x3F58B

Entry point:
E8, 15, F9, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, 24, 67, 48, 00, 00, 74, 05, E9, 74, F9, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02, 74, 06, F3, AB, 85, D2, 74, 0A, 88, 07, 83, C7, 01, 83...
 
[+]

Entropy:
6.5803

Code size:
422 KB (432,128 bytes)

The file howtomakemoneyonfiverr$4000permonth__6817_il2002936.exe has been seen being distributed by the following 5 URLs.

http://www.more-files.com/alldd.html?myref=www.newhdplugin.org&version=1.1.6.20&prefix=FlashPlayerSetup&campid=4369&instid[appname]=FlashPlayer&instid[appsetupurl]=https://launchpad.net/lightspark/trunk/lightspark-0.5.3/ download/Lightspark-0.5.3-win32.exe&instid[appimageurl]=http://www.tsxnrey.com/i/White Smoke Inc/.../150x150_v1Logo.jpg&prefix=FlashPlayer&ti1=MjQwMHw1MDg0fElEfDN8MXx8|5a3b0157431319d258e215fae8b4e084|0f54b900-1efc-11e4-86b2-002590f00f96&capp=FlashPlayer&AMt=1407502875320&AMh=7fn2b4gxIWmb09igS84d2Ie2zMXUjQgM3KAUfCzDKPbVydo5QZMSwcespsmVBC1AtdCH3iBb48loOaw3