raidcall setup.exe

Zulu Soft SRL

This the Soft32 ad-supported download manager that bundles additional PUP offers. "During the download process we may show commercial offers, such as a toolbar or other browser add-ons. The download manager is in no way affiliated or endorsed by the author of this product." The application raidcall setup.exe by Zulu Soft SRL has been detected as adware by 6 anti-malware scanners. The program is a setup application that uses the Soft32 Download Manager installer. The file has been seen being downloaded from raidcall.soft32.com.
Publisher:
Zulu Soft SRL  (signed and verified)

MD5:
f81ad96e8d4ce1d7d877a3ca946aab44

SHA-1:
4022ec879087c0ba2f21d89dd04e2f8fb2864b8c

SHA-256:
223309814dcf8d1e5de7b570c94976521de190cfc58b6657f2997a744bc01f0a

Scanner detections:
6 / 68

Status:
Adware

Explanation:
The setup file is part of the Soft32.com download and install manager. It is an ad-supported installer and attempts to get the user to install various adware toolbars, browser add-ons, game applications or other potentially unwanted programs. If a sponsored software offer such as a toolbar is installed it might change the User’s home page, default search settings and 404 traffic. Note, the software installed by Soft32 is probably safe, just the installer is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 1:36:00 PM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.2152
9.0.1.0128

ESET NOD32
MSIL/Soft32Downloader (variant)
8.9675

Malwarebytes
PUP.Optional.Soft32.A
v2014.05.08.12

NANO AntiVirus
Riskware.Nsis.Downloader.cvxhzw
0.28.0.59048

Reason Heuristics
PUP.Installer.ZuluSoftSRL.O
14.5.8.0

VIPRE Antivirus
Soft32Downloader
28228

File size:
523.2 KB (535,712 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Soft32 Download Manager (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\raidcall setup.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
6/3/2013 5:00:00 PM

Valid to:
6/17/2016 4:59:59 PM

Subject:
CN=Zulu Soft SRL, O=Zulu Soft SRL, L=Sibiu, S=Sibiu, C=RO, SERIALNUMBER=J32/987/2007, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RO

Issuer:
CN=Symantec Class 3 Extended Validation Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
22D4D7E5042BE9C2999CB05C4CA2BB4F

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:fA0NYn+gch3CiVFH4YqdmiwpYJxEMHeFieFY3myZ:IO3XVV5hY+QeieFqm

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file raidcall setup.exe has been seen being distributed by the following URL.

Remove raidcall setup.exe - Powered by Reason Core Security