redsn0w0915b3_downloader_by_redsn0w0915b3.exe

Somoto Ltd.

Somoto uses a monetization platform known as the 'Better Installer' to provide the ability of 3rd party developers to bundle various adware packages through an affiliate pay-per-install program. The application redsn0w0915b3_downloader_by_redsn0w0915b3.exe, “Powered by BetterInstaller” by Somoto has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. Includes the Somoto BetterInstaller, an adware installer that will bundle offers for additional third party applications, mostly adware toolbars, with legitimate softare and may be installed without adequate user consent.
Publisher:
Somoto Ltd.  (signed and verified)

Description:
Powered by BetterInstaller

Version:
2.0.0.0

MD5:
d112e42fa5f58f0bbd389996311938cf

SHA-1:
93f1e4dc6546fb4c08614ba045920fb420ed027e

SHA-256:
81df30b9a5003eaab36928b7f3421d0fb83cbd3d236928ae0e952c69de15616d

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Uses the Somoto 'BetterInstaller' to bundle additional (unwanted) software during install without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/26/2024 6:45:57 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Somoto
7.1.1

Avira AntiVirus
APPL/Somoto.Gen2
7.11.133.166

avast!
Win32:PUP-gen [PUP]
2014.9-140423

AVG
AdInstaller.Somoto
2015.0.3496

Bkav FE
W32.Clod791.Trojan
1.3.0.4959

Clam AntiVirus
Adware.Somoto-1
0.98/18355

Comodo Security
Application.Win32.Somoto.A
17846

Dr.Web
Adware.Somoto.17
9.0.1.0113

ESET NOD32
Win32/Somoto
8.9470

F-Prot
W32/SomotoBetterInstaller.A
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.176.11269

Kaspersky
not-a-virus:Downloader.NSIS.Agent
14.0.0.3975

Malwarebytes
PUP.Optional.Somoto.A
v2014.04.23.01

NANO AntiVirus
Trojan.Win32.Agent.cruvdt
0.28.0.58101

Panda Antivirus
PUP/MultiToolbar.A
14.04.23.01

Qihoo 360 Security
Win32/Virus.Downloader.c73
1.0.0.1015

Reason Heuristics
PUP.BetterInstaller.Somoto.j
14.8.7.17

Sophos
Somoto BetterInstaller
4.97

SUPERAntiSpyware
Adware.Somoto/Variant
10649

Trend Micro House Call
TROJ_GEN.R0C1H07KG13
7.2.113

Vba32 AntiVirus
Downloader.Agent
3.12.24.3

VIPRE Antivirus
BetterInstaller
26838

File size:
162.8 KB (166,672 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\redsn0w0915b3_downloader_by_redsn0w0915b3.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/19/2011 8:00:00 PM

Valid to:
9/19/2014 7:59:59 PM

Subject:
CN=Somoto Ltd., O=Somoto Ltd., STREET=PO Box 58096, L=Tel Aviv, S=--, PostalCode=61580, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00841D099D16B738F34172FEEFE1D2574F

File PE Metadata
Compilation timestamp:
12/17/2010 4:14:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:R22ihA0m3BJf0vtKojEfPKTDhMfk6piADaA/k2kIq1NpZeVG+M:yA0m3T0vsWEfPKXhMfMSdkiWZR+M

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Entropy:
7.6009

Code size:
28.5 KB (29,184 bytes)

The file redsn0w0915b3_downloader_by_redsn0w0915b3.exe has been seen being distributed by the following URL.