installer_pou_para_pc_1_2_6_spanish.exe

Vittalia Internet S.L.

This is the Vittalia Filewon Installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application installer_pou_para_pc_1_2_6_spanish.exe by Vittalia Internet S.L has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the Vittalia DM installer. The file has been seen being downloaded from cdn.filewindwn.com. While running, it connects to the Internet address services.upd4ter.com on port 80 using the HTTP protocol.
Publisher:
Vittalia Internet S.L.  (signed and verified)

MD5:
de95fb0fa1ea52afcaabd711f6ea83b7

SHA-1:
7d8eb37a2ab9415194bc44fb6d9432d66fe58513

SHA-256:
4081f72d3f6aa77a8f7d3a29725923f95b9af86c3aaf6eac93181fa21163a65d

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/27/2024 7:41:42 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
APPL/Vittalia.onema
7.11.196.234

Comodo Security
Application.Win32.Vittalia.L
20423

Dr.Web
Adware.Downware.982
9.0.1.05190

ESET NOD32
Win32/Vittalia.I potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Vittalia
12/20/2014

IKARUS anti.virus
Trojan.Win32.StartPage
t3scan.1.8.5.0

K7 AntiVirus
Trojan
13.188.14395

Malwarebytes
PUP.Optional.VIT
v2014.12.20.02

NANO AntiVirus
Trojan.Win32.Downware.ciyjjq
0.28.6.64267

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.VittaliaInternetSL.d
14.12.20.13

VIPRE Antivirus
Threat.4782551
35418

Zillya! Antivirus
Trojan.StartPage.Win32.20778
2.0.0.2011

File size:
4 MB (4,198,360 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Vittalia DM

Common path:
C:\users\{user}\downloads\installer_pou_para_pc_1_2_6_spanish.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
9/25/2013 9:00:00 PM

Valid to:
10/2/2015 8:59:59 PM

Subject:
CN=Vittalia Internet S.L., OU=IT, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Vittalia Internet S.L., L=Mostoles, S=Madrid, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
61AB07DA761E7D604CB9380594CF7D91

File PE Metadata
Compilation timestamp:
9/25/2013 7:08:24 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:NvX+HmRU/IOsUXe+K3l5Tkug1Vjr2QTIYAnrUTSV2e0/EUmQU/NsW7URPlPWce2M:4l9prubm6VBN

Entry address:
0x166F9

Entry point:
E8, CF, 97, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, A0, 5D, 43, 00, E8, 41, 54, 00, 00, E8, B4, 42, 00, 00, 0F, B7, F0, 6A, 02, E8, 62, 97, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 9D, 76, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4198

Code size:
170.5 KB (174,592 bytes)

The file installer_pou_para_pc_1_2_6_spanish.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.uplstatsone.com  (93.189.33.84:80)

TCP (HTTP):
Connects to services.upd4ter.com  (93.189.33.101:80)

TCP (HTTP):
Connects to media.vitavita.com.es  (109.70.128.135:80)

Remove installer_pou_para_pc_1_2_6_spanish.exe - Powered by Reason Core Security