installer_ares_spanish.exe

Vittalia Internet S.L.

This is the Vittalia Filewon Installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application installer_ares_spanish.exe by Vittalia Internet S.L has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Vittalia DM installer. The file has been seen being downloaded from dv.1aab810gfl.com. While running, it connects to the Internet address services.upd4ter.com on port 80 using the HTTP protocol.
Publisher:
Vittalia Internet S.L.  (signed and verified)

MD5:
bbea1b3172d05848d31ff00edbc437b5

SHA-1:
b1e1f8ebbd5672a3de96c324515ab3c8273850b8

SHA-256:
e06f590f141bd8294ea039630ef30fc94c1d7bd30a78aa5dd8268bfcfd0019c4

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 5:23:33 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Vittalia (M)
17.3.16.3

File size:
1 MB (1,056,400 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Vittalia DM (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\installer_ares_spanish.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
3/9/2015 10:00:00 PM

Valid to:
3/9/2016 9:59:59 PM

Subject:
CN=Vittalia Internet S.L., OU=IT, O=Vittalia Internet S.L., L=Mostoles, S=Madrid, C=ES

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
00A20A10D6AEDC59EDBF0C852C5534C4

File PE Metadata
Compilation timestamp:
12/5/2009 8:52:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file installer_ares_spanish.exe has been seen being distributed by the following URL.

http://dv.1aab810gfl.com/installers/axtan_installers/get.php?ne=1&ik=r3q0sHE3nNzmC9DLjQFH A2TXQWWejQOkcImbH1B5to=&ut=56533238a9b2132c42eca179361e8ced&aa=lp/1/seo//&ua=chrome&u=vQPR0N6tLf6wzDrTqVe9hOQJHVfQxl8LkBPI/LFt eOrNhc4KIycwmI17CnNP45mOGGea8qJFQT/JpE7lKQFSQ/uESR2oTZZvJltsyMMIJKCFqKefw5mvLug/8HS0f5f8xSRzW822hnFzRLOf41rTcQXxu1eAz43D11TtH0oTFDpZINjFoNi/T9BpDbcQ9mkhoeWvRzbteTgOA2BhMMRs6nzxP7Nuqt17dJkhcja5LY SFHg0rcHecAuZGPcTFQI1jJuDawunD/3QUlXjUvkbujDFFph7mims5BhJYzgOQT104vadCsRt4YYgzF9ZS44mwvRBTCE R5AxysDlYvl/Al1B3d6dTAF4boYJRjB18EMzQXLp1arPGD7QZxqdF4/&p=U0VP&x=R9ZctQHiGMl3Cpa0Fncem/7onx KO4b5sIA5E1S2vvidsITwHo2cSmJPq7gVIXd2skTaBUzi9trqVvkk5po4N8Vk vW3RpI/SHybcSENeja5wCmlzbzpC9V0NNNA/PqkWDWwq0D4fBhE2/8ipImq6i0CzhfTLVID3MxxIYqnHRlimwlUC4e8rEWQt/.../W4=&loop=0&s=

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.uplstatsone.com  (93.189.33.84:80)

TCP (HTTP):
Connects to services.upd4ter.com  (93.189.33.101:80)

TCP (HTTP):
Connects to media.vitavita.com.es  (109.70.128.135:80)

TCP (HTTP):
Connects to download.upd4ter.com  (93.189.33.101:80)

 
http://download.upd4ter.com/installers/down.php

Remove installer_ares_spanish.exe - Powered by Reason Core Security