setup.exe

Installer

Stepitapp LLC

The application setup.exe by Stepitapp has been detected as adware by 18 anti-malware scanners. The file has been seen being downloaded from ads.adsrvmedia.com and multiple other hosts. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
Stepitapp LLC  (signed and verified)

Product:
Installer

Version:
1.0.0.0

MD5:
5a29fb7f93611edfea88638d4941d90a

SHA-1:
f26b0b7a9641a9b3e1101540108cfaa79d743a4b

SHA-256:
ce69c2e734081904088421a7c07a86ecc50396858324962d64f9c909baa8d664

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
11/26/2024 10:53:38 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Downloader
2015.01.06

avast!
Win32:Dropper-gen [Drp]
2014.9-151205

Baidu Antivirus
Adware.Win32.Conduit
4.0.3.15125

Dr.Web
Adware.Downware.5822
9.0.1.0339

ESET NOD32
MSIL/Adware.Imali (variant)
9.11259

Fortinet FortiGate
Riskware/Agent
12/5/2015

F-Prot
W32/S-2accf237
v6.4.7.1.166

G Data
Win32.Trojan.Agent.4P134N
15.12.24

IKARUS anti.virus
Trojan.Win32.Agent
t3scan.1.6.1.0

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.1019

McAfee
Artemis!5A29FB7F9361
5600.6561

Panda Antivirus
Trj/Chgt.A
15.12.05.03

Qihoo 360 Security
HEUR/Malware.QVM03.Gen
1.0.0.1015

Quick Heal
Downloader.Agent.r3 (Not a Virus)
12.15.14.00

Reason Heuristics
PUP.Stepitapp.Installer (M)
15.12.5.3

Trend Micro House Call
Suspicious_GEN.F47V0630
7.2.339

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Conduit
31038

File size:
389.4 KB (398,768 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2013

Original file name:
FinalInstaller.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
12/10/2013 6:00:00 PM

Valid to:
12/11/2014 5:59:59 PM

Subject:
CN=Stepitapp LLC, O=Stepitapp LLC, POBox=1252, STREET=9 W. 31st Street, L=Bayonne, S=New Jersey, PostalCode=07002, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00EA7DEF51F4F715C2C81433CCD6B15766

File PE Metadata
Compilation timestamp:
4/26/2014 4:32:46 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:8aQ1CqibqI59PpOPf201/z7psmJI9ftRbl27J:x/qibqI59Pk2cb7psmJ0ftRblIJ

Entry address:
0x5F7DE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 04, 00, 03, 00, 00, 00, 30, 00, 00, 80, 0E, 00, 00, 00, 48, 00, 00, 80, 10, 00, 00, 00, 60, 00, 00, 80, 18, 00, 00, 00, 78, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 02, 00, 00, 00, 90, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 7F, 00, 00, A8, 00...
 
[+]

Entropy:
6.2036

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
374 KB (382,976 bytes)

The file setup.exe has been seen being distributed by the following 2 URLs.

http://ads.adsrvmedia.com/event/click/0/V8IYRL8jRduCcbm9lPD-70-jzj_BR3FZpY43J-1IG_UgI5UZpy5Ggu4HQWDO8ghn5WqpS31Ajxo6MO1g5BbjUsarJCPWU7q9adaAdrAuO3Xj1ReWx3iATx0JSi0rCAl9rhnQw1sknOk5XpBMF80ih1-YJT-eAv1n4h7Fdz_Wtpt4DAIY1axIXzHOgFWnhxk2TmFIpSv579Z8ciInJj0vv40_a6kF4Bwft8zOj2XGX17xhu00uzqZwLZjGUiyN2x05Ie0mdPKRo6RFPsHusJe8Uvjbe67vgGTxUKCdr_OXzHEASsy0oZKrM9yIA_PAHJxNh1NL_mMIN_1As_FgdzxPZkyGO2zJTDMbBR0OriXgxG5DEbEZ8tuxuAt5EG9WnXLieeFnUAn//

http://ads.adsrvmedia.com/event/click/0/Zh13Kw798ecMYXYHsoaaWFQc3BOEMjj-Fsa39g60apmlOOHPW8BDXhQWyy9bakDdl5t0-bT63blO1sGgcIIDa-RaJ8fnDNrKehe7nmzSriB5DaPqcRor-2FjbT3XGvniyAYCD0luFo1bZ86tY3v5henDa5aXOhFAkVKeJsj7uGS33RKfK5vPmYox7PzJfK7pvnZEAFFtDVxAUS-1Ni_wZTT-CUZE42wYYngi1H6Tsegx5nKLjBpUpAn3xWkvC2XyhmOrcP3ckjA0P3H6ILKBgpI3QffjBs05Jn-vOB4AT6r9mPYvSXEr1JjZgiXawg0EJbvYvVshbDfp06jCrgOGfDpHk6zL7q5zTAE-xmBaFkmhUlXBQXwWkT6RqOgW//

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

Remove setup.exe - Powered by Reason Core Security