vgrabber_setup.exe

Bundlore Limited

This is the Bundlore download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application vgrabber_setup.exe by Bundlore Limited has been detected as adware by 7 anti-malware scanners. The program is a setup application that uses the Bundlore Downloader installer. The file has been seen being downloaded from www.vgrabber.com.
Publisher:
Bundlore Limited  (signed and verified)

MD5:
48561815def620f944e9c05900905586

SHA-1:
52645ee585c0f379ad976851fe8128399b1ccd4d

SHA-256:
26057ef8834009f30ede527e548903440cd8a0ec5ea3c1be2f674b87aeb4f6df

Scanner detections:
7 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 5:55:12 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Bundlo
2016.0.3214

ESET NOD32
Win32/Bundlore (variant)
9.9857

IKARUS anti.virus
PUA.Bundlore
t3scan.1.6.1.0

Reason Heuristics
PUP.Installer.Bundlore
15.1.29.13

Rising Antivirus
PE:Malware.Bundlore!6.180F
23.00.65.15127

Sophos
Bundlore
4.98

VIPRE Antivirus
Bundlore
29676

File size:
129.4 KB (132,472 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Bundlore Downloader

Common path:
C:\users\{user}\downloads\vgrabber_setup.exe

Digital Signature
Authority:
Thawte, Inc.

Valid from:
9/11/2013 8:00:00 PM

Valid to:
9/12/2014 7:59:59 PM

Subject:
CN=Bundlore Limited, O=Bundlore Limited, L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
232CE5297F2941A352148152A936FB93

File PE Metadata
Compilation timestamp:
11/14/2013 4:33:37 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
1536:v2CKK/p7GrAmnh/JB7QPBqPcTOclIOZMdPdsWjcde+1KKYpmtVjLui:DarBh/Op/ZMse+1KKY0tJLui

Entry address:
0x35AD

Entry point:
E8, B5, 39, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 20, 7A, 41, 00, E8, BD, 0D, 00, 00, E8, 82, 3B, 00, 00, 0F, B7, F0, 6A, 02, E8, 48, 39, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 29, 33, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
5.9611

Code size:
65.5 KB (67,072 bytes)

The file vgrabber_setup.exe has been seen being distributed by the following URL.

Remove vgrabber_setup.exe - Powered by Reason Core Security