java_installer.exe

Plugin Update SL

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java_installer.exe by Plugin Update SL has been detected as adware by 9 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Plugin Update SL  (signed and verified)

MD5:
37d27c98a25c6c0055160ad64336304b

SHA-1:
9a78906e0f34dc85568a2599302ef0d12fde16e7

SHA-256:
1d46551d6c8714204bde435afaaf69a421820f611e9da6f6b5c9f77b9a715257

Scanner detections:
9 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/27/2024 8:21:48 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

AVG
Found Win32/DH{gRJ UIEHeVRPFVGBFYEJHFOBE0GBDw}
2015.0.3383

ESET NOD32
Win32/SoftPulse.J potentially unwanted application
8.7.0.302.0

herdProtect (fuzzy)
2014.10.28.16

K7 AntiVirus
Unwanted-Program
13.183.13054

McAfee
Program.Socrydo
5600.7039

Norman
Malware
11.20141028

Reason Heuristics
PUP.PluginUpdateSL.O
14.8.14.4

VIPRE Antivirus
Threat.4783235
32186

File size:
1.3 MB (1,373,656 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\java_installer.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/11/2014 5:00:00 PM

Valid to:
6/12/2015 4:59:59 PM

Subject:
CN=Plugin Update SL, O=Plugin Update SL, L=Guia De Isora, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
01438AF7C5B708CB0E497C84D028BF72

File PE Metadata
Compilation timestamp:
8/14/2014 1:04:45 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:3S6Cqp3hVbl9HxvLhgAFlMlCcmpElsnevdxK1Npd:Cqp3LDxdg4lMASl9dxKnn

Entry address:
0x3DF6

Entry point:
E8, 09, 27, 00, 00, E9, 7F, FE, FF, FF, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, F4, 95, 41, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, A8, 80, 41, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, F4, 95, 41, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7, C6, 03, 00, 00, 00...
 
[+]

Entropy:
7.6727

Code size:
61.5 KB (62,976 bytes)

The file java_installer.exe has been seen being distributed by the following URL.

Remove java_installer.exe - Powered by Reason Core Security