installer_english_-_telugu_dictionary_symbian_english.exe

Zoobam

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application installer_english_-_telugu_dictionary_symbian_english.exe by Zoobam has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Zoobam  (signed and verified)

MD5:
cc746771c29a35e521eb0ae0790ab7f5

SHA-1:
89198e47fb73e5f08d9d67ceb41d1a54cca11516

SHA-256:
dcef6726c0759c2128055acec0519432cf3ec742d3e0268f083daab2357add8c

Scanner detections:
27 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 6:39:46 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.KJ
5639178

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.06.04

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

Arcabit
Application.Bundler.KJ
1.0.0.425

avast!
Win32:Adware-CIX [PUP]
150602-1

AVG
Generic
2016.0.3089

Bitdefender
Application.Bundler.KJ
1.0.20.770

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/20547

Comodo Security
Application.Win32.DownloadAdmin.ANGL
22324

Dr.Web
Trojan.Vittalia.36
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.KJ
10.0.0.5366

ESET NOD32
Win32/DownloadAdmin.H potentially unwanted application
7.0.302.0

F-Prot
W32/S-92ce39bf
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.KJ
5.14.151

G Data
Application.Bundler.KJ
15.6.25

K7 AntiVirus
Unwanted-Program
13.204.16128

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.06.03.05

MicroWorld eScan
Application.Bundler.KJ
16.0.0.462

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.30.24.1636

Norman
Application.Bundler.KJ
02.06.2015 14:23:46

Reason Heuristics
PUP.Tightrope.Bundler
15.6.3.13

Sophos
PUA 'DownloadAdmin' (of type Adware)
5.15

Total Defense
Win32/Tnega.IQCCUAC
37.1.62.1

Vba32 AntiVirus
Downloader.Agent
3.12.26.4

VIPRE Antivirus
Threat.4783369
40786

File size:
825.2 KB (845,040 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\programs\installer_english_-_telugu_dictionary_symbian_english.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
10/15/2014 7:27:59 PM

Valid to:
10/15/2017 7:27:59 PM

Subject:
CN=Zoobam, O=Zoobam, L=Kirkland, S=Washington, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EA9D31E75E043

File PE Metadata
Compilation timestamp:
7/15/2014 9:29:31 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:hxpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8S3:Tp9sVuaVdvgVbmgGDijyikg53

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Entropy:
7.4925

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to st-sh-us-dc3-001.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-230-52-224.jfk6.r.cloudfront.net  (54.230.52.224:80)

TCP (HTTP):
Connects to server-54-192-55-38.jfk6.r.cloudfront.net  (54.192.55.38:80)

TCP (HTTP):
Connects to server-54-192-54-208.jfk6.r.cloudfront.net  (54.192.54.208:80)

TCP (HTTP):
Connects to server-54-192-54-180.jfk6.r.cloudfront.net  (54.192.54.180:80)

TCP (HTTP):
Connects to server-54-192-54-171.jfk6.r.cloudfront.net  (54.192.54.171:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)