potload_downloader-0xoxbmys.exe

Somoto Israel

This is the Somoto BetterInstaller, an installer that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application potload_downloader-0xoxbmys.exe by Somoto Israel has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Somoto BetterInstaller installer. The file has been seen being downloaded from potload.com.
Publisher:
Somoto Israel  (signed and verified)

MD5:
c486689ab0076581a379b147d755d660

SHA-1:
32e8e0e8ebaf2a3d642abfed69b38dc0280b93dc

SHA-256:
e27118b63ab3b7c43e0309c0324e0a9df1c09257be0f3c1628a596750e587898

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
11/6/2024 1:58:34 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Somoto (M)
16.7.28.11

File size:
231.4 KB (236,920 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\downloads\potload_downloader-0xoxbmys.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/7/2013 7:00:00 PM

Valid to:
7/8/2018 6:59:59 PM

Subject:
CN=Somoto Israel, O=Somoto Israel, STREET=Habarzel 32, L=Tel Aviv, S=--, PostalCode=69700, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
74F2E607D2905C0E3EA9C8AB59942D25

File PE Metadata
Compilation timestamp:
12/17/2010 3:14:15 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
6144:oJ380oRuNGMY0Zqk2JnPz4b4JRZYFWxxgAPE:oF80oRwG7q2tz4b4xYYxxs

Entry address:
0x380C

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 87, 4D, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 2A, 4A, 00, 00, 6A, 00, E8, 9B, 4D, 00, 00, 6A, 08, A3, 28, F9, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, D8, F9, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, 4C, A2, 40, 00, E8, E0, 4C, 00, 00, 83, EC, 0C, 68, 4D, A2, 40, 00, 68, 08, FA, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, E6, 49, 00, 00, 52, 52, 50, 68, 00, 80, 43, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 29, 49, 00, 00, 83...
 
[+]

Entropy:
7.7625  (probably packed)

Code size:
30 KB (30,720 bytes)

The file potload_downloader-0xoxbmys.exe has been seen being distributed by the following URL.

Remove potload_downloader-0xoxbmys.exe - Powered by Reason Core Security