setup.exe

Digital Plugin S.l.

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe by Digital Plugin S.l has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. The file has been seen being downloaded from www.lpmxp2087.com.
Publisher:
Digital Plugin S.l.  (signed and verified)

MD5:
77cb80ab5f54e9d7677d7a659717af02

SHA-1:
e70ac526cc9a3f6234c3302c434c072aa2643197

SHA-256:
6dcb8d658feb8e8429ad3474c4647611c12209b956f6214f1499657244659550

Scanner detections:
31 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/27/2024 8:56:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.150962
863

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Adware/Win32.Agent
2014.08.23

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:PUP-gen [PUP]
2014.9-140924

AVG
Win32/DH{gRJ+UIEHeVRPFVGBFYEJHFOBE0GBDw}
2015.0.3341

Bitdefender
Gen:Variant.Adware.Graftor.150962
1.0.20.1335

Clam AntiVirus
Win.Adware.Agent-10436
0.98/19429

Dr.Web
Adware.Downware.5878
9.0.1.0267

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.150962
8.14.09.24.06

ESET NOD32
Win32/SoftPulse.J potentially unwanted application
8.7.0.302.0

F-Prot
W32/A-93d66bbd
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Graftor.150962
11.2014-24-09_4

G Data
Gen:Variant.Adware.Graftor.150962
14.9.24

herdProtect (fuzzy)
2014.12.6.19

IKARUS anti.virus
Trojan.Dropper
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13139

Kaspersky
not-a-virus:AdWare.Win32.SoftPulse
15.0.0.494

Malwarebytes
PUP.Optional.DomaIQ
v2014.09.24.08

McAfee
SoftPulse
5600.6997

Microsoft Security Essentials
Threat.Undefined
1.185.1001.0

MicroWorld eScan
Gen:Variant.Adware.Graftor.150962
15.0.0.801

NANO AntiVirus
Trojan.Win32.Buzus.ddkefn
0.28.2.61721

Norman
Malware
11.20140924

nProtect
Trojan-Clicker/W32.SoftPulse.1248976
14.09.24.01

Panda Antivirus
Trj/Genetic.gen
14.09.24.08

Reason Heuristics
PUP.Installer.DigitalPluginSl.F
14.9.24.18

Sophos
SoftPulse
4.98

Vba32 AntiVirus
Trojan.Buzus
3.12.26.3

VIPRE Antivirus
Threat.4150696
32210

Zillya! Antivirus
Trojan.Buzus.Win32.121291
2.0.0.1899

File size:
1.2 MB (1,248,976 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/13/2014 7:00:00 PM

Valid to:
7/14/2015 6:59:59 PM

Subject:
CN=Digital Plugin S.l., O=Digital Plugin S.l., L=Guia de Isora, S=Santa Cruz de Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
229111B20CCF13394E8E6CA9EAB4121F

File PE Metadata
Compilation timestamp:
8/2/2014 6:58:00 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:C+9W0LXXy9G36xN9G36xtnMm4qu/5858PizfhUEza8Fgys7rW31JTPeTv0MSXwcs:HWq35qn4quRnwW8yNKnDXZvQj

Entry address:
0x5CB0

Entry point:
E8, 0F, 20, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 45, 0C, 83, EC, 20, 56, 57, 6A, 08, 59, BE, 10, 20, 41, 00, 8D, 7D, E0, F3, A5, 8B, 4D, 08, 5F, 5E, 85, C0, 74, 0D, F6, 00, 10, 74, 08, 8B, 01, 8B, 40, FC, 8B, 40, 18, 89, 4D, F8, 89, 45, FC, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, AC, 10, 41, 00, C9, C2, 08, 00, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, 4D, EC, 33, CD, E8, 37...
 
[+]

Entropy:
7.7110  (probably packed)

Code size:
61.5 KB (62,976 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security