mediaget.exe

POPELER SYSTEM, S.L.

The setup program uses the Firseria/Solimba AppInstaller (DownloadMR) which is a monetization download manager that bundles additional adware offers, typically by wrapping legitimate applications. The application mediaget.exe by POPELER SYSTEM, S.L has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
POPELER SYSTEM, S.L.  (signed and verified)

MD5:
01d841c25201344d2a2135e990d82c7e

SHA-1:
42a765407dff4a911f93899754aff51e5bbe831d

SHA-256:
39c62b950bcd6e3f41da741c318a141ecd12141f7b938a63cd2ae1dca83a3cfe

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/14/2024 5:26:30 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba.POPELERS (M)
16.5.12.20

File size:
557.7 KB (571,104 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\mediaget.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
7/25/2014 8:00:00 AM

Valid to:
8/29/2016 7:59:59 AM

Subject:
CN="POPELER SYSTEM, S.L.", OU=IT, O="POPELER SYSTEM, S.L.", L=Badalona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
7D4509F01375B349F2DE66BF15A48CD7

File PE Metadata
Compilation timestamp:
1/20/2015 7:41:54 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:xwx78mCoT4ymZyiF8pKfLt7yx0lBSdUCJ5yjlLr8C:xwx7UoTIZyiF2Kfx7Q0O9+H8C

Entry address:
0xD13C

Entry point:
E8, AE, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, E8, 5D, 42, 00, E8, FE, 15, 00, 00, E8, 7F, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 41, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 0A, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7561  (probably packed)

Code size:
110 KB (112,640 bytes)

The file mediaget.exe has been seen being distributed by the following URL.

Remove mediaget.exe - Powered by Reason Core Security