raidcall setup.exe

Zulu Soft SRL

This the Soft32 ad-supported download manager that bundles additional PUP offers. "During the download process we may show commercial offers, such as a toolbar or other browser add-ons. The download manager is in no way affiliated or endorsed by the author of this product." The application raidcall setup.exe by Zulu Soft SRL has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the Soft32 Download Manager installer. The file has been seen being downloaded from raidcall.soft32.com.
Publisher:
Zulu Soft SRL  (signed and verified)

MD5:
e67a4e2478f32cb87ac6bc860a4a7cbe

SHA-1:
be36156b5f95d2c66ffe7fcc5cab2284be939baf

SHA-256:
b874e5af27c520058901e390d2b1418edd243f87d0f6e123439fab8695ed8446

Scanner detections:
10 / 68

Status:
Adware

Explanation:
The setup file is part of the Soft32.com download and install manager. It is an ad-supported installer and attempts to get the user to install various adware toolbars, browser add-ons, game applications or other potentially unwanted programs. If a sponsored software offer such as a toolbar is installed it might change the User’s home page, default search settings and 404 traffic. Note, the software installed by Soft32 is probably safe, just the installer is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/26/2024 1:27:54 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Downware
7.1.1

Avira AntiVirus
APPL/Downloader.Gen
7.11.201.100

AVG
Generic
2016.0.3229

Dr.Web
Adware.Downware.9012
9.0.1.05190

ESET NOD32
MSIL/Soft32Downloader.C potentially unwanted application
7.0.302.0

Malwarebytes
PUP.Optional.Zulu
v2015.01.14.03

NANO AntiVirus
Riskware.Nsis.Downloader.cvxhzw
0.30.0.64448

Reason Heuristics
PUP.Installer.ZuluSoftSRL.O
15.1.14.12

Vba32 AntiVirus
TScope.Trojan.MSIL
3.12.26.3

VIPRE Antivirus
Threat.4783370
36504

File size:
519.3 KB (531,776 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Soft32 Download Manager (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\raidcall setup.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
6/4/2013 12:00:00 PM

Valid to:
6/18/2016 11:59:59 AM

Subject:
CN=Zulu Soft SRL, O=Zulu Soft SRL, L=Sibiu, S=Sibiu, C=RO, SERIALNUMBER=J32/987/2007, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RO

Issuer:
CN=Symantec Class 3 Extended Validation Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
22D4D7E5042BE9C2999CB05C4CA2BB4F

File PE Metadata
Compilation timestamp:
5/12/2014 8:03:42 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:0tdBaTYdbjNPmszGtW+2Zqm9BR+UcMJPo+SmIAjpQm2f+F:6BbdblTGp20mcUceHSmIuQm2f

Entry address:
0x30E2

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 90, 91, 40, 00, 89, 5C, 24, 20, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, 1C, 71, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 08, A3, 58, E4, 42, 00, E8, 95, 2D, 00, 00, A3, A4, E3, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, E0, 87, 42, 00, FF, 15, 64, 71, 40, 00, 68, 80, 91, 40, 00, 68, A0, DB, 42, 00, E8, 3F, 2A, 00, 00, FF, 15, 20, 71, 40, 00, BD, 00, 40, 43, 00, 50, 55, E8, 2D, 2A...
 
[+]

Entropy:
7.9117

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file raidcall setup.exe has been seen being distributed by the following URL.

Remove raidcall setup.exe - Powered by Reason Core Security