setup1.exe

White Sea Media

The application setup1.exe by White Sea Media has been detected as adware by 9 anti-malware scanners. This is a setup program which is used to install the application. This is a malicious Bitcoin miner. Bitcoin-mining malware is designed to force computers to generate Bitcoins for cybercriminals' use and consumes computing power. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from downloads.shoppingsuggestion.com.
Publisher:
White Sea Media  (signed and verified)

MD5:
4984e24035dde098d9bff9241cbd1a96

SHA-1:
ebdad25144115a04ecbfa3dd0055b771edf75a27

SHA-256:
d77daa67ea6241e42163e3dc5386f0832d7f443953034e5ecc4f3aab17d067a9

Scanner detections:
9 / 68

Status:
Adware

Explanation:
Part of a backdoor IRC bot network.

Analysis date:
11/5/2024 9:58:50 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:BitCoinMiner-FC [Trj]
2014.9-140117

AVG
MalSign.Generic
2015.0.3592

Dr.Web
Trojan.BtcMine.221
9.0.1.017

Emsisoft Anti-Malware
Trojan.Win32.Miner
8.14.01.17.11

G Data
Win32.Trojan.Agent.B4D2N2
14.1.24

McAfee
Artemis!4984E24035DD
5600.7248

Reason Heuristics
PUP.Installer.WhiteSeaMedia.G
14.8.7.21

Trend Micro House Call
TROJ_GEN.F47V0114
7.2.17

VIPRE Antivirus
Backdoor.Win32.Ircbot.gen
25508

File size:
1.2 MB (1,225,440 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\setup1.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/8/2013 2:00:00 AM

Valid to:
7/9/2014 1:59:59 AM

Subject:
CN=White Sea Media, O=White Sea Media, STREET=4142 Mariner Blvd, L=Spring Hill, S=FL, PostalCode=34609, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1FB235ACA7565BA27ADC702B2BD05C7F

File PE Metadata
Compilation timestamp:
12/26/2013 7:46:25 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:PG/dPWcNZmnVm7TNFYXQMfhWJKaScnuj5pbH+gNjPvYZLehu:PG/kcuCZWCJhujnegRPvKSu

Entry address:
0x31E000

Entry point:
83, EC, 04, 50, 53, E8, 01, 00, 00, 00, CC, 58, 89, C3, 40, 2D, 00, F0, 11, 00, 2D, 8F, 8E, 0A, 10, 05, 84, 8E, 0A, 10, 80, 3B, CC, 75, 19, C6, 03, 00, BB, 00, 10, 00, 00, 68, 17, D2, 67, 48, 68, 00, 18, 55, 15, 53, 50, E8, 0A, 00, 00, 00, 83, C0, 00, 89, 44, 24, 08, 5B, 58, C3, 55, 89, E5, 50, 53, 51, 56, 8B, 75, 08, 8B, 4D, 0C, C1, E9, 02, 8B, 45, 10, 8B, 5D, 14, 85, C9, 74, 0A, 31, 06, 01, 1E, 83, C6, 04, 49, EB, F2, 5E, 59, 5B, 58, C9, C2, 10, 00, C1, 56, A4, FB, F2, 10, 6D, 73, C2, FE, 08, 5D, BB, 87...
 
[+]

Code size:
49.5 KB (50,688 bytes)

The file setup1.exe has been seen being distributed by the following URL.

Remove setup1.exe - Powered by Reason Core Security