setup.exe

Setup Module

Visual Tools

The application setup.exe, “Setup Application” by Visual Tools has been detected as adware by 42 anti-malware scanners. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. This will display context specific advertisements in the browser as well as attempt to modify the browser's search provider. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address DedLoadLM2200.babylon.com on port 80 using the HTTP protocol.
Publisher:
Babylon Ltd.  (signed by Visual Tools)

Product:
Setup Module

Description:
Setup Application

Version:
9.1.2.12

MD5:
6b4d0b876674c7efae47968f25684ea3

SHA-1:
bcc094636e321eaa0d7237662ba0f16235c317fc

SHA-256:
4880bfefbb66552d3c40cc66618e2c5f1915868cb1dbcc34ccde624dbb6a5d78

Scanner detections:
42 / 68

Status:
Adware

Explanation:
The installer may include an offer for the Babylon Toolbar (a homepage/search hijacker), which is potentially installed with minimal user consent.

Analysis date:
12/25/2024 12:53:24 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
911

Agnitum Outpost
Win32.Sality.AP.Gen
7.1.1

AhnLab V3 Security
Win32/Kashu.E
2014.07.24

Avira AntiVirus
W32/Sality.AT
7.11.30.172

avast!
Win32:Kukacka
2014.9-140807

AVG
Win32/Sality
2015.0.3389

Baidu Antivirus
Virus.Win32.Sality.$Emu
4.0.3.1487

Bitdefender
Win32.Sality.3
1.0.20.1095

Bkav FE
W32.Clod2b6.Trojan
1.3.0.4562

Boost by Reason
Optional.VisualTools.F
188838

Clam AntiVirus
WIN.Worm.Brontok
0.98/18355

Comodo Security
Application.Win32.Babylon.id
17372

Dr.Web
Trojan.StartPage.56734
9.0.1.0351

Emsisoft Anti-Malware
Win32.Sality
8.14.08.07.10

ESET NOD32
Win32/Toolbar.Babylon (variant)
7.9120

Fortinet FortiGate
W32/Chir.B@mm
8/15/2014

F-Prot
W32/Sality.gen2
v6.4.6.5.141

F-Secure
Win32.Sality.3
11.2014-07-08_5

G Data
Win32.Sality
14.8.24

IKARUS anti.virus
Virus.Win32.Sality
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.181.12819

Kaspersky
Virus.Win32.Sality
14.0.0.3440

Malwarebytes
v2013.12.17.05

McAfee
W32/Sality.gen.z
5600.7045

Microsoft Security Essentials
Threat.Undefined
1.179.842.0

MicroWorld eScan
Win32.Sality.3
15.0.0.657

NANO AntiVirus
Virus.Win32.Sality.yusp
0.28.2.60990

Norman
Sality.ZHB
11.20140807

nProtect
Virus/W32.Sality.D
14.07.23.01

Panda Antivirus
W32/Sality.AA
14.08.07.10

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
8.14.14.00

Reason Heuristics
PUP.Installer.VisualTools.F
14.8.7.21

Rising Antivirus
PE:Win32.KUKU.kj!1522176
23.00.65.14805

Sophos
Mal/Sality-D
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Nullo[Short]
10435

Total Defense
Win32/Sality.AA
37.0.11077

Trend Micro House Call
TROJ_GEN.F47V0927
7.2.358

Trend Micro
PE_SALITY.RL
10.465.07

Vba32 AntiVirus
suspected of Trojan.Downloader.gen
3.12.24.3

VIPRE Antivirus
Threat.4721115
31208

ViRobot
Win32.Sality.N
2011.4.7.4223

File size:
1.2 MB (1,301,064 bytes)

Product version:
9.1.2.12

Copyright:
Copyright © Babylon Ltd. 1997-2013

Original file name:
Setup32.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\latest\setup.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
1/9/2013 10:00:00 PM

Valid to:
1/10/2015 9:59:59 PM

Subject:
CN=Visual Tools, O=Visual Tools, L=Belgrade, S=Serbia, C=RS

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
789958B0264F06055619270074AFA61F

File PE Metadata
Compilation timestamp:
8/7/2013 7:03:29 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:JIuR5jihYZJg+XHhaBFG1IayUHvFYgWSUkC:JlGaZBaBURxHvFYhxkC

Entry address:
0x75CE9

Entry point:
E8, 95, DF, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 10, 7D, 4C, 00, E8, C1, F4, FF, FF, E8, A4, 22, 00, 00, 0F, B7, F0, 6A, 02, E8, 28, DF, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, A4, 7D, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
613.5 KB (628,224 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to DedLoadLM2200.babylon.com  (184.154.27.232:80)

TCP (HTTP):
Connects to ba-sh-us-dc3-005.babylon.com  (198.143.175.67:80)

Remove setup.exe - Powered by Reason Core Security