madya_ku_bomba_-_ngw.exe

Spiral Media

The application madya_ku_bomba_-_ngw.exe by Spiral Media has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Tomorrow Software Installer installer. The file has been seen being downloaded from files4.downloadnet1194.com.
Publisher:
Spiral Media  (signed and verified)

Product:
Spiral Media

Version:
78.6.1.397

MD5:
aeefad024107da2268fa4cdcc12ad35c

SHA-1:
513282fdfdd23e8b4fb2652b8a911553e4ca786f

SHA-256:
87346c560d8d0299cbb3fb6d7f6d93fef02a6063912339828f2f9c1cd1e60fe0

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
11/15/2024 2:40:26 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TomorrowSoftware (M)
16.7.16.18

File size:
871.1 KB (892,032 bytes)

Product version:
78.6.1.397

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tomorrow Software Installer

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\madya_ku_bomba_-_ngw.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
11/21/2015 12:46:38 AM

Valid to:
10/14/2016 1:17:39 AM

Subject:
CN=Spiral Media, O=Spiral Media, L=San Francisco, S=California, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
028EC22ABAD314A6

File PE Metadata
Compilation timestamp:
12/20/2014 12:09:33 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:yrt1YpDDa7GtreqfiTZIyR6no1P3V6mf2:AGU0rBfgIu6nopVA

Entry address:
0x464A

Entry point:
E8, 41, 96, 00, 00, E9, 44, 8F, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 81, EC, 18, 02, 00, 00, 53, 8B, 9C, 24, 20, 02, 00, 00, 55, 56, 57, 8D, 44, 24, 10, 50, 33, FF, 57, 6A, 01, 53, 89, 7C, 24, 20, E8, 7B, 09, 00, 00, 8B, 4C, 24, 20, 8B, F0, 83, C4, 10, 8D, 2C, 0E, 85, F6, 75, 1D, 53, E8, 55, 07, 00, 00, 53, E8, 4F, 07, 00, 00, 83, C4, 08, 8D, 47, 02, 5F, 5E, 5D, 5B, 81, C4, 18, 02, 00, 00, C3, 6A, 02, 53, E8, 26, 06, 00, 00, 8D, 54, 24, 24, 52, 53, E8, DB, 08, 00, 00, 83, C4, 10, 3B, F5...
 
[+]

Code size:
53.5 KB (54,784 bytes)

The file madya_ku_bomba_-_ngw.exe has been seen being distributed by the following URL.

Remove madya_ku_bomba_-_ngw.exe - Powered by Reason Core Security