icreinstall_installer_adobe_flash_player_english.exe

Vittalia Internet S.L

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_installer_adobe_flash_player_english.exe by Vittalia Internet S.L has been detected as adware by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from freempr8.softsofast.com and multiple other hosts. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
Vittalia Internet S.L  (signed and verified)

MD5:
6829cdbb8f9e9c977496d07b5dbe6763

SHA-1:
e17e2d9bed9fec76375431048ca10d9577612065

SHA-256:
9e4b0ba9032782ec8ca691d0207d9dfd30689bd9dcc87b3ce073c79fb626bbfb

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/24/2024 9:52:18 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.198.40

AVG
Generic
2016.0.3049

Dr.Web
Trojan.Packed.28459
9.0.1.0195

ESET NOD32
Win32/InstallCore.QW (variant)
9.10931

Fortinet FortiGate
Riskware/InstallCore
7/14/2015

G Data
Win32.Application.InstallCore.CM
15.7.24

K7 AntiVirus
Unwanted-Program
13.188.14468

Malwarebytes
PUP.Optional.Vittalia
v2015.07.14.08

McAfee
Artemis!6829CDBB8F9E
5600.6705

NANO AntiVirus
Riskware.Win32.InstallCore.dimyzq
0.30.0.64448

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Reason Heuristics
PUP.Vittalia.VittaliaInternetSL.Bundler (M)
15.7.14.8

Trend Micro House Call
Suspicious_GEN.F47V1106
7.2.195

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.3

VIPRE Antivirus
Adware.InstallCore
36112

File size:
762 KB (780,288 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_installer_adobe_flash_player_english.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
7/9/2014 11:18:24 AM

Valid to:
8/9/2015 11:18:24 AM

Subject:
CN=Vittalia Internet S.L, O=Vittalia Internet S.L, L=Mostoles, S=Madrid, C=ES

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121296DFC83F15C4B1C19CE7B920AA7D12F

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:qPFafJduqBYuk26xsMmJDIYfM8N7NvI/0ILAtWTuSbIQHdFzZ+OV36:qPFKJduJ1xefzm0F8TFXdP+OV36

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8814

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file icreinstall_installer_adobe_flash_player_english.exe has been seen being distributed by the following 3 URLs.

http://freempr8.softsofast.com/.../download?p=REVENUE&trckid=009062959014503914248&track_curl=0

http://freempr9.softsofast.com/.../download?p=REVENUE&trckid=007388767014522144000

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)