setup_v2.exe

Tuguu Israel Ltd

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application setup_v2.exe by Tuguu Israel has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent.
Publisher:
Tuguu Israel Ltd  (signed and verified)

MD5:
8cd6d9ee116865fe294c750c06b045f9

SHA-1:
b55399727f73b2cbeca815b7cc8b636a6a76b275

SHA-256:
1f2147a301975d5abaafcf73f3feccfb1027ed9f8bd8d02106cda0ca1fb856d4

Scanner detections:
31 / 68

Status:
Adware

Explanation:
The software bundles potentially unwanted offers during setup including toolbars and adware.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/25/2024 12:19:33 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11000985
949

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
14.06.30

Avira AntiVirus
APPL/DomaIQ.AV
7.11.144.168

avast!
Win32:PUP-gen [PUP]
2014.9-140630

AVG
Skodna.Generic_r
2015.0.3427

Bitdefender
Trojan.Generic.11000985
1.0.20.905

Clam AntiVirus
Win.Adware.Domaiq-18
0.98/21411

Comodo Security
Application.Win32.DomaIQ.D
18146

Dr.Web
Trojan.PayInt.27
9.0.1.0181

Emsisoft Anti-Malware
Trojan.Generic.11000985
8.14.08.30.12

ESET NOD32
Win32/DomaIQ.AV (variant)
8.9704

F-Prot
W32/Backdoor2.HTIW
v6.4.7.1.166

F-Secure
Trojan.Generic.11000985
11.2014-30-06_2

G Data
Trojan.Generic.11000985
14.6.24

herdProtect (fuzzy)
2014.8.30.16

IKARUS anti.virus
not-a-virus:AdWare.Win32.DomaIQ
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11833

Kaspersky
not-a-virus:AdWare.Win32.Lollipop
14.0.0.3630

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.06.30.11

McAfee
Adware-DomaIQ!AEE9C150A47C
5600.7083

MicroWorld eScan
Trojan.Generic.11000985
15.0.0.543

NANO AntiVirus
Riskware.Win32.DomaIQ.csmcgi
0.28.0.59492

nProtect
Trojan.Generic.11000985
14.04.21.01

Panda Antivirus
PUP/MultiToolbar.A
14.06.30.11

Quick Heal
Adware.Domal.A5
6.14.12.00

Reason Heuristics
PUP.Installer.TuguuIsrael.I
14.8.7.22

Rising Antivirus
PE:PUF.DomaIQ!1.9DE0
23.00.65.14828

Sophos
DomainIQ pay-per install
4.98

Vba32 AntiVirus
AdWare.DomaIQ
3.12.26.0

VIPRE Antivirus
DomaIQ
28484

File size:
449 KB (459,800 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\setup_v2.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
6/11/2013 8:00:00 PM

Valid to:
8/20/2014 8:00:00 AM

Subject:
CN=Tuguu Israel Ltd, O=Tuguu Israel Ltd, L=RAMAT GAN, C=IL

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
06FD356584CBF71B04A7AFE790A2329F

File PE Metadata
Compilation timestamp:
1/9/2014 11:46:35 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:uOeTIfnjAEkxJPNeaL9uRqQb3fgnFwFGLgJ2k0SyCKF1pYax6uYj+LkY46:tAEOJPNeapQrgjLgJoSyCuDYax6hjz6

Entry address:
0xCCE2

Entry point:
E8, 94, 5E, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 88, 22, 42, 00, E8, C4, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 58, 88, 42, 00, 77, 22, 6A, 04, E8, 7F, 60, 00, 00, 59, 83, 65, FC, 00, 56, E8, 86, 68, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D0, 04, 00, 00, C3, 6A, 04, E8, 7A, 5F, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 70, D0, 41, 00, 83, 3D, 1C, 85, 42, 00, 00, 75, 18, E8, 3A, 57, 00...
 
[+]

Code size:
110.5 KB (113,152 bytes)

The file setup_v2.exe has been seen being distributed by the following URL.

Remove setup_v2.exe - Powered by Reason Core Security