um_e_t_em_apuros_torrent_dual_udio_avi_dvdrip_filmes_torrentsetup-i60a0h68k.exe

SITE ON SPOT Ltd.

This is the Somoto BetterInstaller, an installer that bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application um_e_t_em_apuros_torrent_dual_udio_avi_dvdrip_filmes_torrentsetup-i60a0h68k.exe by SITE ON SPOT has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the Somoto BetterInstaller installer. Includes the Somoto BetterInstaller, an adware installer that will bundle offers for additional third party applications, mostly adware toolbars, with legitimate softare and may be installed without adequate user consent.
Publisher:
SITE ON SPOT Ltd.  (signed and verified)

MD5:
fe75df64acf99de9d80e60f5c9d3ac34

SHA-1:
309833772fd6d2d0cbd89fcdc6134b69ec21df9e

SHA-256:
dff967901fcd9d4bb67b32099550dd5c697468cc0625aff23c6b457638c35ce3

Scanner detections:
25 / 68

Status:
Adware

Explanation:
Uses the Somoto 'BetterInstaller' to bundle additional (unwanted) software during install without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/24/2024 7:12:16 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Somoto.J
874

Avira AntiVirus
APPL/Somoto.hzis
7.11.171.238

avast!
Somoto-P [PUP]
140908-2

AVG
Generic
2015.0.3352

Baidu Antivirus
Adware.Win32.Somoto
4.0.3.14914

Bitdefender
Application.Bundler.Somoto.J
1.0.20.1285

Clam AntiVirus
Win.Adware.Somoto
0.98/19360

Dr.Web
Trojan.Packed.26824
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.Somoto
14.09.14

ESET NOD32
Win32/Somoto.G potentially unwanted application
7.0.302.0

F-Secure
Application.Bundler.Somoto.J
11.2014-14-09_1

IKARUS anti.virus
PUA.Somoto
t3scan.1.7.8.0

K7 AntiVirus
Adware
13.183.13358

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.494

Malwarebytes
PUP.Optional.Somoto.A
v2014.09.14.02

McAfee
Somoto-BetterInstaller
5600.7008

MicroWorld eScan
Application.Bundler.Somoto.J
15.0.0.771

NANO AntiVirus
Riskware.Nsis.Adware.dbnhrj
0.28.2.61942

nProtect
Trojan-Clicker/W32.Agent.225096
14.09.14.01

Panda Antivirus
Trj/CI.A
14.09.14.02

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.SITEONSPOT.?
14.9.14.2

Sophos
Somoto BetterInstaller
4.98

SUPERAntiSpyware
PUP.Somoto/Variant
10361

VIPRE Antivirus
Threat.4783461
32938

File size:
219.8 KB (225,096 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Somoto BetterInstaller

Common path:
C:\users\{user}\downloads\um_e_t_em_apuros_torrent_dual_udio_avi_dvdrip_filmes_torrentsetup-i60a0h68k.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
6/27/2013 9:00:00 PM

Valid to:
6/28/2015 8:59:59 PM

Subject:
CN=SITE ON SPOT Ltd., O=SITE ON SPOT Ltd., L=Tel Aviv, S=NA, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
3EE11B140A803DE260823157A875B8C5

File PE Metadata
Compilation timestamp:
12/17/2010 7:14:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
6144:VA0m3D0oYgv5YKO9pJlHs7YMmyfvMDEq6600/3eiwKk:VA0iD0oxhGfivmQzA9/3eiwj

Entry address:
0x39AC

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, 7C, 01, 00, 00, E8, 97, 46, 00, 00, 83, EC, 0C, 68, 01, 80, 00, 00, E8, 42, 43, 00, 00, 6A, 00, E8, AB, 46, 00, 00, 6A, 08, A3, 88, 4C, 42, 00, E8, B1, 28, 00, 00, 6A, 00, 68, 60, 01, 00, 00, A3, 38, 4D, 42, 00, 8D, 85, 90, FE, FF, FF, 50, 6A, 00, 68, A4, A2, 40, 00, E8, F0, 45, 00, 00, 83, EC, 0C, 68, A5, A2, 40, 00, 68, 68, 4D, 42, 00, E8, EF, 2A, 00, 00, 83, C4, 18, E8, FE, 42, 00, 00, 52, 52, 50, 68, 00, D0, 42, 00, E8, DA, 2A, 00, 00, 57, 6A, 00, E8, 39, 42, 00, 00, 83...
 
[+]

Code size:
28.5 KB (29,184 bytes)

The file um_e_t_em_apuros_torrent_dual_udio_avi_dvdrip_filmes_torrentsetup-i60a0h68k.exe has been seen being distributed by the following URL.